Recent Posts
- How Liam Desmond Chased His Childhood Dream & Changed Careers
- How Justin Christian Charted His New Career Path
- How Dany Trainor Turned Their Passion for Data Science Into A New Career
- How Bellevue Graduate Hannah Preisinger Landed Her Dream Job
- Meet Tom Hollingshead, a Bellevue graduate who has gone from the Marine Corps to Coding Bootcamp
Recent Comments
Monthly Archives: June 2022
How to Share a Secret (Key), on AWS
AWS Secrets Manager was launched by Amazon Web Services in April 2018. Secrets Manager is an application that you can use with AWS cloud accounts to store, retrieve and retrieve credentials – all via API or AWS Command Line Interface. … Continue reading
Posted in Uncategorized
Leave a comment
How to secure your PowerShell
PowerShell is an extremely powerful tool that can do incredible things in IT Infrastructure automation. It can also be misused for malicious purposes, which could lead to real damage to our environment. PowerShell security helps to minimize such risks, mainly … Continue reading
Posted in Uncategorized
Leave a comment
How to Prevent Credential Stuffing Attacks
Online, terms like data breaches, brute force attacks and cybersecurity are part of our everyday vocabulary. Credential stuffing is a term that may be less common outside the cybersecurity community. Data breaches that are well-publicized quickly make the top news, … Continue reading
Posted in Uncategorized
Leave a comment
How to Prepare for the OSCP
The information security market is still volatile. We’ve heard about a disturbing trend for years, with survey after survey reporting the exact same thing: a severe shortage of qualified, skilled talent to fill mission-critical roles. This should make your ears … Continue reading
Posted in Uncategorized
Leave a comment
How to Prepare for the OSCP With the OWASP
Injections are a crucial vulnerability that every student of the OSCP must be aware of. We covered this vulnerability in a previous article. This category of vulns can be used by hackers in many ways, including SQL injections, command injections, … Continue reading
Posted in Uncategorized
Leave a comment
How to prepare for a Capture the Flag Hacking Competition
Hacking is not like the movies. Your motley crew is there to support you when you face off against a worthy adversary. Most security jobs are boring, and you probably want them that way. Audit. Find vulnerabilities. Patch. Rinse and … Continue reading
Posted in Uncategorized
Leave a comment
How to plan your Microsoft Exchange 2016 Setup
Despite the rise of collaboration services, video conferencing, and social media, email remains the most important communication tool for organizations. Imagine what happens if email service is interrupted. Customers don’t receive order confirmation emails, sales can’t send proposals to prospects … Continue reading
Posted in Uncategorized
Leave a comment
How to choose the right AWS Storage Service for Your Organization
In recent years, anyone with large storage requirements has likely considered the cloud. Cloud storage is not as simple as we would like. Each AWS storage service offers its own unique features and pitfalls, while reducing costs. It can be … Continue reading
Posted in Uncategorized
Leave a comment
How to Pass the Palo Alto PCNSE Exam
The highly sought-after certification of Palo Alto Networks’ Certified Network Security Engineer is PCNSE. It certifies that candidates are able to design, install and configure security systems for Palo Alto Networks. Security engineers, pre-sales engineers, and system integrators typically hold … Continue reading
Posted in Uncategorized
Leave a comment
How to move from Azure DevOps into GitHub Actions
Azure DevOps is one of the most widely used CICD solutions in DevOps. It’s even very popular outside of the Microsoft realm. Many organizations use AWS and Azure DevOps to manage their CICD solutions. It’s fast, robust and fully hosted … Continue reading
Posted in Uncategorized
Leave a comment