PinnedNoureldin Ehab | Creeper.exeIntroduction To AWS Cloud Security Chaos EngineeringAWS Cloud Security Chaos Engineering VS Adversary Simulation/EmulationMar 4Mar 4
Noureldin Ehab | Creeper.exeCryptography Through The Ages (Part 2)From Scytale to Quantum-Safe CryptographyJan 24, 2023Jan 24, 2023
Noureldin Ehab | Creeper.exeAWS AppConfig ExtensionsAWS AppConfig for Quick, Secure, and Simple DeploymentDec 15, 2022Dec 15, 2022
Noureldin Ehab | Creeper.exeCryptography Through The Ages (Part 1)From Scytale to Quantum-Safe CryptographyDec 14, 2022Dec 14, 2022
Noureldin Ehab | Creeper.exeWhat is AWS AppConfig?AWS AppConfig for Quick, Secure, and Simple DeploymentDec 7, 2022Dec 7, 2022
Noureldin Ehab | Creeper.exeWhat Are Sock Puppet AccountsI had this question a while back when I noticed that I have been interacting with a sock puppet account for years, I wondered what made it…Sep 8, 2022Sep 8, 2022
Noureldin Ehab | Creeper.exeSecure by Design: How Can UX Protect Your DataHow can user experience design protect your dataSep 7, 2022Sep 7, 2022
Noureldin Ehab | Creeper.exeHow to pass the AWS Security Specialty exam?First, we need to know why would we want to be AWS Certified Security Specialists.Sep 5, 2022Sep 5, 2022
Noureldin Ehab | Creeper.exeAWS security best practices for non-security professionalsFirst, we need to understand what makes a system secure.Sep 4, 2022Sep 4, 2022
Noureldin Ehab | Creeper.exeIntroduction to the MITRE ATT&CK FrameworkWhat is the MITRE ATT&CK Framework?Aug 19, 20222Aug 19, 20222