Implementation of Information Security Controls for Cyber Defense
Secure Configurations for Hardware, Software and Network Devices, Vulnerability Assessment and Remediation, Web Browser Protections, Malw...
Secure Configurations for Hardware, Software and Network Devices, Vulnerability Assessment and Remediation, Web Browser Protections, Malware Defenses, Control of Network Ports, Protocols, and Services, Data Recovery, Wireless Access Control, Penetration Testing, Incident Response and Management
API
Integration
Application Security
View more
API
Integration
Application Security
Web Application Security
Infrastructure
Security testing
Network Security
View more
Design and Implementation of an AWS Cloud Infrastructure
Design and implement an AWS Infrastructure with various resources which includes VPC, EC2, S3, IAM, EBS, Security Group, Route-53, Auto S...
Design and implement an AWS Infrastructure with various resources which includes VPC, EC2, S3, IAM, EBS, Security Group, Route-53, Auto Scaling and RDS. Including DR strategy for Fail-over.
API
Amazon EC2
Amazon S3
View more
API
Amazon EC2
Amazon S3
Amazon RDS
Network Security
AWS Lambda
View more