| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
This is a guide for architectural considerations and configuration recommendations for deploying the AWS Web Application Firewall (WAF) security automation solutions. We will discuss using AWS CloudFormation templates to launch, configure, and implement best practices for security and availability. I am a student of information assurance and computer security at Capitol Technology University. I am passionate about infrastructure, software, and platforms as a service at the enterprise level. I am active in the Detroit Meetup scene and have attend Meetups focused on Linux, Devops, minorities in STEM, and Makers fairs. I have presented at GIT Caffeinated Detroit, where I spoke about how to conduct vulnerability assessments on web applications. I have completed training on AWS architecture and currently studying to take the CISSP on 15 April 2018. I do consulting for Nubis Pro, which is a small AWS architecture security consulting firm based in Charlotte, NC. I am currently finishing my time in the Army and will be begun exiting my military service career. I have served in the Army for almost 20 years at various positions of responsibility and leadership. These positions have included Combat Reconnaissance Specialist, Communications Security Manager, Information Assurance Manager, Medical Recruiter, Physical Security Manager, and Secure Radio Operations Instructor. I have been deployed to Iraq, Afghanistan, and Republic of Georgia all in support of the Global War on Terrorism. During my time in the Army I have had the opportunity to brief general officers, business leaders, and government officials both foreign and domestic. Back to Converge 2018 video list
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast