CyberchopsImplementing AWS CDK and Open Search WAF Dashboard for Visibility and Security DocumentationIntroductionNov 26, 2023Nov 26, 2023
CyberchopsBuilding Microsoft Sentinel SIEM with Live Attack Monitoring on a MapIntroduction I’ll guide you on how to build Microsoft Sentinel Security Information and Event Management (SIEM) and configure it for live…Nov 24, 2023Nov 24, 2023
CyberchopsInstalling Terraform: A Step-by-Step GuideTerraform is a powerful infrastructure as code (IaC) tool that allows you to define and provision infrastructure efficiently. Whether…Oct 5, 2023Oct 5, 2023
CyberchopsBuilding a Cybersecurity Home Lab: Analyzing Logs with Splunk on AWS EC2Updated: Jul 25Sep 5, 2023Sep 5, 2023
CyberchopsHow to Set Up an Automated Forex Trading Environment on AWSUpdated: Jul 25Sep 5, 2023Sep 5, 2023
CyberchopsInstalling Wireshark on an EC2 Instance and Analyzing Network Traffic with FiltersIn this blog, we will walk you through the process of installing Wireshark on an Amazon EC2 instance, connecting to the instance via RDP…Sep 5, 2023Sep 5, 2023