๐๏ธ 1.1 Deploy Stack
Youtube ๐บ
๐๏ธ 1.2 Accessing Application
Youtube ๐บ
๐๏ธ 1.3 Threat Model
Youtube ๐บ
๐๏ธ 1.4 Destroy Stack
Youtube ๐บ
Provision AWS EKS and components using Terraform, deploy and model the platform, then identify and assess potential threats, including application security, credential leaks, compliance, authentication, authorization, and supply chain issues. Afterward, destroy the insecure setup and rebuild a secure environment while preparing the lab for future use.
Youtube ๐บ
Youtube ๐บ
Youtube ๐บ
Youtube ๐บ