Step 1: Import a domain name on AWS

Step 2: Create a hosted zone and manage its DNS records

Project 1 - Static Website

Step 5: Create an SSL certificate for the website using AWS Certificate Manager (ACM)

Step 6: Create CloudFront distributions to secure the website in HTTPS.

Project 2 -Train and deploy a machine learning model using Amazon SageMaker and Python

4a. Train Dataset

Step 6: Train a Model

4c. Test Dataset

Step 7: Deploy the Model to Amazon EC2

Step 4: Configure Route 53 to link the domain name to the website

Step 3: Create S3 Buckets to host website pages

Finished!

Project 4

Step 1: Create an Amazon SageMaker Notebook Instance

Step 4: Split the Dataset into Train, Validation, and Test Datasets

Step 2: Create a Jupyter notebook in the SageMaker notebook instance

Step 3: Import and display dataset

4b. Validation Dataset

Step 5: Convert the Train and Validation Datasets to CSV Files and upload to Amazon S3

8a. Make predictions of the test dataset and plot a histogram

8c. Compute the log loss function of the logistic regression.

8b. Use the Scikit-learn library to return the output confusion metrics and classification report with a cutoff of 0.5

Finished!

Project 3

2.Add IAM user to a IAM group from the CLI

4. Test and Debug IAM policies using the IAM policy simulator

Project 5

·       SDLC/SSDLC

·       Source Code

·       CI/CD

·       Internal/External Dependencies

·       SAST/DAST

·       Containerization

·       Container Hardening

·       Dockers

·       Kubernetes

·       Jenkins

·       On-Premises IaC

·       Cloud-Based IaC

1.Create an IAM user from the CLI

3. Attach IAM policies to groups from the CLI

·       Vulnerability Assessment and Penetration Tests

·       Windows Privilege Escalation

·       Tampering With Unprivileged Accounts

·       Backdooring Files

·       Backdooring the Login Screen / RDP

·       Spawning Processes Remotely

·       Moving Laterally Using WMI

·       Port Forwarding

·       Data Exfiltration (HTTPS,SSH,TCPICMP,DNS)

·       DNS Tunneling

·       AV Static Detection

·       AV Testing and Fingerprinting

·       Shellcode Encoding and Encryption

·       Protecting and Stripping Identifiable Information

·       Evasion via Protocol Manipulation

·       Evasion via Payload Manipulation

·       Evasion via Route Manipulation

·       Evasion via Tactical DoS

·       C2 and IDS/IPS Evasion