Articles in this series
Lab Scenario In this lab, you will take on the role of a developer tasked with creating a web application that allows users to upload and store files...
🚀 Sign up for the challenge Here by Cyber-defender for Free AIM This lab aims to analyze the CloudTrail logs for AWS security incidents related to...
Lab Objective In this lab, you will be playing the role of an incident responder with access to the 'Security' AWS account as an IAM user. This...
Lifecycle Process Research the attack technique — Lab 1 Set up proper logging — Lab 2 Attack realistic assets — Lab 3 Review log data — Lab...
I recommend starting with the article below before beginning the Hands-on...
This project demonstrates the deployment of the ELK Stack on an AWS EC2 instance and the ingestion of Flaws.cloud CloudTrail logs into the ELK Stack...