Harsha SG's Projects
Curated list of awesome cloud security blogs, podcasts, standards, projects, and examples.
The approach in each AWS Cloud Quest: Cloud Practitioner assignment focused on teaching the material, then having me apply it so that I’m learning information, not reiterating it. And discovering the game elements — like the quiz questions, challenges, drones, and pets — motivated me to keep coming back to learn more. This was one of the most unique training methods I’ve seen for cloud, and I’m excited to keep learning.
Hands on labs and code to help you learn, measure, and build using architectural best practices.
Many security positions particularly on the blue team side look for SIEM experience when evaluating potential candidates. SIEM stands for Security Information and Event Management System. This is a tool allows security professionals to analyze log data from a variety of sources within their network such as Firewalls, IDS/IPS, Identity solutions.
A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
Linux, Jenkins, AWS, SRE, Prometheus, Docker, Python, Ansible, Git, Kubernetes, Terraform, OpenStack, SQL, NoSQL, Azure, GCP, DNS, Elastic, Network, Virtualization. DevOps Interview Questions
Devops Tutorial for Beginners - Learn Docker, Kubernetes, Terraform, Ansible, Jenkins and Azure Devops
CS-898BA course is designed to impart knowledge of applications, concepts, and techniques of image analysis and computer vision in general. The course helps the student in developing skills in using Python and Open CV to solve practical problems in a variety of disciplines.
This demo app shows a simple user profile app set up using index.html with pure js and css styles nodejs backend with express mode mongodb for data storage All components are docker-based.
The challenge has two parts.
To develop a two-class fingerprint spoof detector that uses Local Binary Patterns (LBP) and Histogram of Oriented Gradients (HOG) features along with Support Vector Machines (SVM) to distinguish live fingerprints images from spoof samples Training and Testing Live and Fake fingerprint samples are located at: https://drive.google.com/drive/folders/1nLWXD8wR7zD4tI0udk2GN6XC9EqIF8PR?usp=sharing
A content-based movie recommender system using cosine similarity. using the Bag-of-words model, based on the user input this project will recommend similar movies to the user. Pandas are used to pre-process the data and Streamlit library is used to host our project on the website. Then deployed the application on the cloud Project demo: https://mrs- bidrae.herokuapp.com/
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
This demo app shows a simple user profile app set up using index.html with pure js and css styles nodejs backend with express mode mongodb for data storage All components are docker-based
Writeups, Walkthroughs, and blog https://n1ghtx0w1.github.io
National Initiative for Cybersecurity Education (NICE)
NICE Challenges walk-throughs
Archival location for write-ups of submissions for the NICE Challenge Project.
Public script from SANS FOR509 Enterprise Cloud Incident Response
Automatically Revert and Receive Notifications About Changes to Security Groups 🎓
TryHackMe is an online platform that teaches cyber security through short, gamified real-world labs.