Step 1: Import a domain name on AWS
Step 2: Create a hosted zone and manage its DNS records
Project 1 - Static Website
Step 5: Create an SSL certificate for the website using AWS Certificate Manager (ACM)
Step 6: Create CloudFront distributions to secure the website in HTTPS.
Project 2 -Train and deploy a machine learning model using Amazon SageMaker and Python
4a. Train Dataset
Step 6: Train a Model
4c. Test Dataset
Step 7: Deploy the Model to Amazon EC2
Step 4: Configure Route 53 to link the domain name to the website
Step 3: Create S3 Buckets to host website pages
Finished!
Project 4
Step 1: Create an Amazon SageMaker Notebook Instance
Step 4: Split the Dataset into Train, Validation, and Test Datasets
Step 2: Create a Jupyter notebook in the SageMaker notebook instance
Step 3: Import and display dataset
4b. Validation Dataset
Step 5: Convert the Train and Validation Datasets to CSV Files and upload to Amazon S3
8a. Make predictions of the test dataset and plot a histogram
8c. Compute the log loss function of the logistic regression.
8b. Use the Scikit-learn library to return the output confusion metrics and classification report with a cutoff of 0.5
Finished!
Project 3
2.Add IAM user to a IAM group from the CLI
4. Test and Debug IAM policies using the IAM policy simulator
Project 5
· SDLC/SSDLC
· Source Code
· CI/CD
· Internal/External Dependencies
· SAST/DAST
· Containerization
· Container Hardening
· Dockers
· Kubernetes
· Jenkins
· On-Premises IaC
· Cloud-Based IaC
1.Create an IAM user from the CLI
3. Attach IAM policies to groups from the CLI
· Vulnerability Assessment and Penetration Tests
· Windows Privilege Escalation
· Tampering With Unprivileged Accounts
· Backdooring Files
· Backdooring the Login Screen / RDP
· Spawning Processes Remotely
· Moving Laterally Using WMI
· Port Forwarding
· Data Exfiltration (HTTPS,SSH,TCPICMP,DNS)
· DNS Tunneling
· AV Static Detection
· AV Testing and Fingerprinting
· Shellcode Encoding and Encryption
· Protecting and Stripping Identifiable Information
· Evasion via Protocol Manipulation
· Evasion via Payload Manipulation
· Evasion via Route Manipulation
· Evasion via Tactical DoS
· C2 and IDS/IPS Evasion