| - |
 |
AWS Environment Audit |
IAM, Policy Simulator, Security Groups,CloudTrail, CloudWatch, EC2, VPC |
| - |
 |
Virtual Private Cloud |
VPC, Subnet, Gateway, Route Table |
| - |
 |
Azure Disaster Recovery |
Backup, Replication |
| - |
 |
Burp Suite |
Browser Attack, Firefox ESR, OWASP Mutillidae II, XSS |
| - |
 |
NetSec Threat Detection |
Cloud Armor, XSS, SQLi |
| - |
 |
DNS Security |
dig, dns-sec, spf, iana, verisign, mxtoolbox |
| - |
 |
Detect & Investigate Threats |
Event Threats Detection, SCC |
| - |
 |
Cloud Data Loss Prevention |
DLP API, Sensitive PII Data Protection, Redaction |
| - |
 |
DVWA |
SQL Injection |
| - |
 |
Next-Generation Firewall |
Fortigate, ngfw, Fortinet, ELB, Network Security |
| - |
 |
File Server Resource Manager |
Microsoft Server |
| - |
 |
Security Command Center |
Risk, Threats, Vulnerabilities, Compliance, Assets, Findings, Sources, Posture Management |
| - |
 |
Hardening GKE Cluster |
Kubernetes, PodSecurityPolicy, DevSecOps, SSRF, PSA, RCE |
| - |
 |
Identity & Access Management |
IAM, Users, Groups, Policies, AWS |
| - |
 |
Network Security |
Cloud Armor, Load Balance |
| - |
 |
Static Application Security Testing |
nodejsscan, SCA, OWASP, Juice Shop |
| - |
 |
Security Information Event Management |
SIEM, OSSIM Alienvault |
| - |
 |
Web Application Firewall |
WAF, Kali, Nikto, OWASP |
| - |
 |
Analyze Network Traffic Packet |
Wireshark, Security Analyst |
| - |
 |
Phishing Insident Response Automation |
Cortex XSOAR, Palo Alto Networks, SOAR |
| - |
:-: |
:-: |
:-: |