#  @cybersecnerd cybersecnerd
cybersecnerd posts on YouTube about splunk, for all, gain, main the most. They currently have [-----] followers and [--] posts still getting attention that total [---] engagements in the last [--] hours.
### Engagements: [---] [#](/creator/youtube::UCtDZbBEqTWlzdu-KLuid2Jg/interactions)

- [--] Week [---] -49%
- [--] Month [-----] -3.20%
- [--] Months [------] -12%
- [--] Year [------] +249%
### Mentions: [--] [#](/creator/youtube::UCtDZbBEqTWlzdu-KLuid2Jg/posts_active)

- [--] Week [--] +200%
- [--] Month [--] +200%
- [--] Months [--] +200%
- [--] Year [--] +500%
### Followers: [-----] [#](/creator/youtube::UCtDZbBEqTWlzdu-KLuid2Jg/followers)

- [--] Week [-----] +0.43%
- [--] Month [-----] +1.70%
- [--] Months [-----] +15%
- [--] Year [-----] +42%
### CreatorRank: [---------] [#](/creator/youtube::UCtDZbBEqTWlzdu-KLuid2Jg/influencer_rank)

### Social Influence
**Social category influence**
[technology brands](/list/technology-brands)
**Social topic influence**
[splunk](/topic/splunk) #12, [for all](/topic/for-all), [gain](/topic/gain), [main](/topic/main), [repo](/topic/repo), [image](/topic/image), [pdf](/topic/pdf), [cloud](/topic/cloud), [hero](/topic/hero), [port](/topic/port)
**Top accounts mentioned or mentioned by**
[@telegram](/creator/undefined) [@gmailcom](/creator/undefined) [@timestamp](/creator/undefined)
### Top Social Posts
Top posts by engagements in the last [--] hours
"Splunk - Mastering SPL (Grouping and correlating) Splunk - Mastering SPL (Grouping and correlating) commands SPL : Transaction index=main sourcetype="access_combined_wcookie" transaction JSESSIONID stats max(duration) index=main sourcetype="access_combined_wcookie" transaction JSESSIONID clientip startswith="action=view" endswith="action=purchase" Subsearch index=main sourcetype="access_combined_wcookie" search index=main sourcetype="access_combined_wcookie" stats count by productId sort [--] count fields productId Append No of purchases for [--] days and for ALL TIME index=main"
[YouTube Link](https://youtube.com/watch?v=0egn0Iis_ks) 2020-12-26T12:55Z [----] followers, [----] engagements
"Splunk - Threat Hunting for PowerShell Execution Splunk - Threat Hunting for PowerShell Execution SPL Queries used Here : Windows login event via Powershell as a channel sourcetype="threathunting*" Channel IN ("Microsoft-Windows-PowerShell/Operational") EventID=4103 table Channel _time Hostname sort -_time Non-Interactive mode Powershell spawned from some other process sourcetype="threathunting**" EventID=4688 NewProcessName="*powershell.exe*" ParentProcessName="*explorer.exe*" stats count by EventID NewProcessName ParentProcessName SubjectUserName SubjectDomainName _time Event ID = 7"
[YouTube Link](https://youtube.com/watch?v=2HXYIhbGjCg) 2022-06-18T13:52Z [----] followers, [----] engagements
"Part [--] of Chapter [--] - Running Container with Pseudo TTY The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers VIDEO : Running Container with Pseudo TTY #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=_ZjdnfW98eY) 2022-06-17T04:46Z [----] followers, [---] engagements
"Docker - CI/CD #docker #devops #container Creating CI/CD pipeline using docker containers PLEASE FOLLOW ALONG WITH ME textual slides here please download : https://github.com/chirag99969/dockercicd/raw/main/Dockercicd-handson.pdf Container [--] - Postgres Container [--] - Gogs ( local git hub repo) Container [--] - registry (local docker hub) Container [--] - jenkins 0:00 Introduction 1:05 Theory Concepts 2:45 Hands On started/Clone repo 3:05 Setting stage 3:56 Understanding docker-compose.yaml File for Postgres 5:20 Understanding docker-compose.yaml File for Gogs 6:25 Understanding docker-compose.yaml"
[YouTube Link](https://youtube.com/watch?v=lU3QDwhdNbE) 2022-05-30T11:43Z [----] followers, [---] engagements
"Practical Splunk Administration in [--] Hours #splunk #splunkadmin #cybersecnerd By seeing this VIDEO I am confident you will be able to perform all Splunk Administration tasks. Download the PDF as well : https://github.com/chirag99969/SPL/tree/main/splunk-admin-zero-to-hero -----------------------------------------Timeline--------------------------------------------------------------------- Introduction - 0:00 Course Intro/Curriculum - 1:55 Splunk Enterprise Components - 5:04 Splunk Licensing Options - 13:25 Managing License Violations - 18:41 OVERVIEW Working with Splunk Config files - 21:00"
[YouTube Link](https://youtube.com/watch?v=VZakh4GPQPQ) 2023-05-19T16:30Z [----] followers, 10.9K engagements
"Splunk - Mastering SPL (4) Less Used BUT Impactful Commands 0:00 - Intro 1:10 - iplocation 4:00 - geostats 5:10 - xyseries 8:15 - addtotals 9:15 - addcoltotals 10:10 - bin 13:30 - erex 16:45 - coalesce 20:50 - tstats #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd"
[YouTube Link](https://youtube.com/watch?v=BOQ9xB4j3cM) 2021-01-23T13:44Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Transforming and Streaming commands) Splunk - Mastering SPL (Transforming and Streaming commands). Develop a knack Distinct Count V/s estdc index=main sourcetype=access_combined_wcookie stats dc(clientip) AS "distinct client ips" BY Clause (Splitting) index=main sourcetype=access_combined_wcookie stats countBY method action categoryId Functions index=main sourcetype=access_combined_wcookie stats max(bytes) AS "Largest" min(bytes) AS "Smallest" avg(bytes) AS "Average" perc95(bytes) AS "95th percentile" Values/List for stats index=main"
[YouTube Link](https://youtube.com/watch?v=_5_mA11NLTQ) 2020-12-28T03:10Z [----] followers, [----] engagements
"Practical #Splunk - Zero to Hero #cybersecnerd Complete Hands-On - You will be splunk enthusiast in [--] Hours reachme @telegram username @cybersecnerd wanna skip theory - GO TO lesson [--] directly ALL SPL Queries : https://github.com/chirag99969/SPL/tree/main/splunk-zero-to-hero Lesson [--] IntroductionTABLE of contents - 0:00 Splunk architecture - 4:30 Splunk Downloadable links - 16:09 Installing Splunk- 19:30 Setting Splunk username/pasword - 24:40 Uploading Tutorial Data - 26:45 Lesson [--] Search Processing Language - 31:10 Introducing Splunk Interface - 31:30 Structure of SPL - 38:17 Running basic"
[YouTube Link](https://youtube.com/watch?v=tMacaM1I1CI) 2022-11-25T13:23Z [----] followers, 124.7K engagements
"Build Your First #splunk Dashboard #intellipaat #edureka Learn how to build dashboards in Splunk Quickly. Tutorial Dataset Links: https://docs.splunk.com/Documentation/SplunkCloud/9.0.2303/SearchTutorial/Systemrequirements#Download_the_tutorial_data_files ----------------- Timeline ---------------------------------------------------------------------------------------- Introduction - 0:00 Splunk Installation made easy - 1:00 Add data/Ingest data/Tutorial data - 2:04 Different sourcetypes - 4:00 Start creating Dashboard - 5:40 Creating multiple input Panels - 9:40 Customizing Dashboard - 12:05"
[YouTube Link](https://youtube.com/watch?v=ao-6FH1C3lU) 2023-05-30T16:42Z [----] followers, [---] engagements
"Practical Splunk Administration in [--] Hours #splunk #splunkadmin #cybersecnerd By seeing this VIDEO I am confident you will be able to perform all Splunk Administration tasks. Download the PDF as well : https://github.com/chirag99969/SPL/tree/main/splunk-admin-zero-to-hero -----------------------------------------Timeline--------------------------------------------------------------------- Introduction - 0:00 Course Intro/Curriculum - 1:55 Splunk Enterprise Components - 5:04 Splunk Licensing Options - 13:25 Managing License Violations - 18:41 OVERVIEW Working with Splunk Config files - 21:00"
[YouTube Link](https://youtube.com/watch?v=VZakh4GPQPQ) 2023-05-19T16:30Z [----] followers, 10.9K engagements
"Learn chatGPT in [--] mins #chatgpt #genrative #ai ChatGPT in [--] mins: ✅ Learning Objectives ✅ Evolution of ChatGPT ✅ Time to reach 100M Users ✅ Generative AI seeing mass adoption ✅ What is ChatGPT ✅ What ChatGPT is trained on ✅ Interacting with ChatGPT ✅ Basic Prompting ✅ Prompting V/S Asking ✅ Role Prompting ✅ Multi-Faceted Prompting ✅ Examples of Writing Style ✅ Use Punctuation ✅ ChatGPT limitations ✅ JAILBREAK Prompt ✅ Evaluate your RESUME ✅ Evaluate your Linked IN Profile ✅ Conclusion Music: bensound.com License code: GXKNI4QXTDMNCFUT #chatgpt #ai #openai #generative #cybersecnerd #chatgpt"
[YouTube Link](https://youtube.com/watch?v=CO137qmhQcw) 2023-05-09T06:56Z [----] followers, [---] engagements
"Git and GitHub Crash course in an Hour Master Git in an Hour. Push and Pull Changes to GitHub repository. -------------------------TimeLine----------------------------------------------- Git Crash couse Intro - 0:00 Getting started with git - 1:12 Committing changes to git (All Practical from this section) - 4:33 Set Author name and Email before committing - 8:36 First git commit - 11:06 Explore Commit History - 12:40 Git commands - 16:12 Checking out commit and branches - 17:42 File tracking statuses decoded - 21:56 Merging Branches - 28:05 Explore commit tree using graph - 36:13 Git push to"
[YouTube Link](https://youtube.com/watch?v=YLLSTcFGP4M) 2023-04-28T04:40Z [----] followers, [---] engagements
"Kubernetes in [--] Hours (All Practical) Illustrative Diagrams and Visualizations to explain Services and Storage ALL commads used here : https://github.com/chirag99969/kubernetes Section [--] Understanding kubernetes - 0:00 Kubernetes Host Platform - 4:36 Kubernetes ecosystem - 6:24 Setting up minikube on ec2 (ubuntu) in [--] mins - 10:51 minikube start - 17:00 kubectl TAB completion - 18:50 kubernetes resources - 21:00 kubectl TAB completion cmd - 24:09 kubectl api-resources - 24:41 PODS and Deployments DEMO - 26:25 namespaces - 39:11 DEMO - Troubleshooting pods - 42:40 DEMO - Service (Illustrative"
[YouTube Link](https://youtube.com/watch?v=D-F67zHsnbs) 2023-03-18T11:49Z [----] followers, [----] engagements
"Practical #Splunk - Zero to Hero #cybersecnerd Complete Hands-On - You will be splunk enthusiast in [--] Hours reachme @telegram username @cybersecnerd wanna skip theory - GO TO lesson [--] directly ALL SPL Queries : https://github.com/chirag99969/SPL/tree/main/splunk-zero-to-hero Lesson [--] IntroductionTABLE of contents - 0:00 Splunk architecture - 4:30 Splunk Downloadable links - 16:09 Installing Splunk- 19:30 Setting Splunk username/pasword - 24:40 Uploading Tutorial Data - 26:45 Lesson [--] Search Processing Language - 31:10 Introducing Splunk Interface - 31:30 Structure of SPL - 38:17 Running basic"
[YouTube Link](https://youtube.com/watch?v=tMacaM1I1CI) 2022-11-25T13:23Z [----] followers, 124.7K engagements
"Setup #minikube cluster in [--] minutes Setting up minikube can be troublesome See this video use this shell script you can have minikube cluster up and running in just [--] minutes. JUST execute this shell script. github repo : https://github.com/chirag99969/ckad-exercises/blob/main/minikube-docker-setup.sh time stamps: 0:00 : Introduction 0:35 : Creating Ubuntu machine on AWS 3:15 : Execute the shell script have you minikube cluster ready in a minute Prerequisites: Ubuntu Server [-----] LTS Minimum 2vCPUs Min 4GB RAM Disk Size : I am using [--] GB (Would suggest make it [--] GB) #k8s #minikube #devops"
[YouTube Link](https://youtube.com/watch?v=zc5ks0Vd8Oc) 2022-11-14T06:49Z [----] followers, [---] engagements
"CKAD Exercise [--] Health Check Readiness Probe and Liveness Probe Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Readiness Probe and Liveness Probe: 👉 Create a new Pod named hello that exposes the port [----]. Provide the name nodejs-port for the container port. 👉 Add a Readiness Probe that checks the URL path / on the port referenced with the name nodejs-port after a [--] seconds delay. You do not have to define the period interval. 👉 Add a Liveness Probe that verifies that the app is up and running every [--] seconds by"
[YouTube Link](https://youtube.com/watch?v=cSNNvR-IXMM) 2022-10-10T13:42Z [----] followers, [---] engagements
"CKAD Exercise [--] adapter pattern formatting logs using side car Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises 👉 The business application running the main container produces timestamped informationin this case the available disk spaceand writes it to the file diskspace.txt. 👉 As part of the architecture we want to consume the file from a third-party monitoring application. The problem is that the external application requires the information to exclude the timestamp. 👉 Now we could change the logging format to"
[YouTube Link](https://youtube.com/watch?v=SOx25pkhx20) 2022-10-10T13:35Z [----] followers, [--] engagements
"CKAD Exercise [--] side car container for logging Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Side Car container: 👉 The sidecar container polls the files error.log periodically and checks if any failures have been discovered. 👉 More specifically the service tries to find failures assigned to the error log level indicated by error in the log file. If an error is found the monitoring service will react to it. 👉 For example it could send a notification to the administrators of the system. Well keep the"
[YouTube Link](https://youtube.com/watch?v=dI16W1BqnrM) 2022-10-10T13:30Z [----] followers, [---] engagements
"CKAD Exercise [--] Define Pod Resource Requirements Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Defining a Pods Resource Requirements Create a new Pod that exceeds the limits of the resource quota requirements e.g. by defining 1Gi of memory but stays below the CPU e.g. [---]. Write down the error message. Change the request limits to fulfill the requirements to ensure that the Pod could be created successfully. Write down the output of the command that renders the used amount of resources for the namespace. #cncf"
[YouTube Link](https://youtube.com/watch?v=7ILGJFL0BPY) 2022-09-21T06:01Z [----] followers, [--] engagements
"CKAD Exercise [--] Create security context for pod Minikube Setup : https://youtu.be/ZTO1doC8SOc repo: https://github.com/chirag99969/ckad-exercises/tree/main/exercises Creating a Security Context for a Pod Create a Pod named secured that uses the image nginx for a single container. Mount an emptyDir volume to the directory /data/app. Files created on the volume should use the filesystem group ID [----]. Get a shell to the running container and create a new file named logs.txt in the directory /data/app. List the contents of the directory and write them down. #cncf #k8s #ckad #devops #cncf #k8s"
[YouTube Link](https://youtube.com/watch?v=nzJg3PtrKBQ) 2022-09-21T05:56Z [----] followers, [---] engagements
"CKAD Exercise [--] Configure a pod using secret Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo: https://github.com/chirag99969/ckad-exercises/tree/main/exercises Configuring a Pod to Use a Secret Create a new Secret named db-credentials with the key/value pair db-password=passwd. Create a Pod named backend that uses the Secret as environment variable named DB_PASSWORD and runs the container with the image nginx. Shell into the Pod and print out the created environment variables. You should find DB_PASSWORD variable. #cncf #k8s #ckad #devops #cncf #k8s #ckad #devops"
[YouTube Link](https://youtube.com/watch?v=NnQ240qbAKU) 2022-09-21T05:52Z [----] followers, [--] engagements
"CKAD Exercise [--] Creating Using configmap Minikube Setup : https://youtu.be/ZTO1doC8SOc Create a new file named config.txt with the following environment variables as key/value pairs on each line. o DB_URL equates to localhost:3306 o DB_USERNAME equates to postgres Create a new ConfigMap named db-config from that file. Create a Pod named backend that uses the environment variables from the ConfigMap and runs the container with the image nginx. Shell into the Pod and print out the created environment variables. You should find DB_URL and DB_USERNAME with their appropriate values. #ckad #cncf"
[YouTube Link](https://youtube.com/watch?v=aDqbmmpiaD4) 2022-09-20T11:27Z [----] followers, [--] engagements
"CKAD Exercise [--] Create Inspect Pod Minikube Setup : https://youtu.be/ZTO1doC8SOc Creating a pod and Inspecting it : Create the namespace ckad-prep. In the namespace ckad-prep create a new Pod named mypod with the image nginx:2.3.5. Expose the port [--]. Identify the issue with creating the container. Write down the root cause of issue in a file named pod-error.txt. Change the image of the Pod to nginx:1.15.12. List the Pod and ensure that the container is running. Log into the container and run the ls command. Write down the output. Log out of the container. Retrieve the IP address of the Pod"
[YouTube Link](https://youtube.com/watch?v=aqL318kgiA0) 2022-09-20T11:19Z [----] followers, [---] engagements
"Practical #kubernetes in [--] hours Practical #kubernetes in [--] hours (zero to hero) Full hands On minimal essential theory (Skip first [--] mins of theory if you wish) Lab Setup (my environment) : https://youtu.be/ZTO1doC8SOc 00:00 k8s terms concepts brief 06:56 Creating Cluster using minikube and Exploring k8s nodes 11:38 Pods creation 20:26 Deployment creation 28:40 Service creation 36:36 Creating Node Web Application 39:17 Dockerizing Node Application/building docker image/pushing to docker hub 43:55 Creating deployment based on custom docker image 49:00 Scaling Custom image deployment 53:38"
[YouTube Link](https://youtube.com/watch?v=9f6rQkYlJHU) 2022-07-25T14:06Z [----] followers, [---] engagements
"Practical #kubernetes lab setup #minikube on #ubuntu [----] OR [-----] Practical Kubernetes in [--] Hours: LAB setup in ubuntu [-----] LTS OR [-----] LTS (All commands used below agenda) Agenda for this playlist: K8s Local Development Minikube setup on Ubuntu [-----] LTS OR [-----] LTS (VS Code Remote SSH) K8s Terms terminologies K8 Cluster Pod Creation Deployment creation Service creation Running Node.js app using K8 Rolling Updates and Pod discovery YAML spec files Multi Deployment creation Interaction between deployments LAB setup in ubuntu [-----] LTS Commands : sudo apt-get update -y sudo apt-get upgrade"
[YouTube Link](https://youtube.com/watch?v=ZTO1doC8SOc) 2022-07-23T13:15Z [----] followers, [----] engagements
"#splunk - #threathunting Privilege Escalation Hypothesis : Adversary can query instance metadata for misconfigured Ec2 acting as Proxy to retrieve temporary credentials. Scenario : Attacker retrieved temporary credentials which he later used to exfiltrate data from S3 Bucket SPL : Activities from outside our network index="aws-test" sourcetype="_json" search NOT sourceIPAddress IN (10.0.0.0/8 192.168.0.0/16 172.16.0.0/12) Activities performed by this sourceIP: index="aws-test" sourcetype="_json" sourceIPAddress="1.2.3.4" stats count values(eventName) by userIdentity.arn"
[YouTube Link](https://youtube.com/watch?v=ctwBpPK1Rh8) 2022-06-19T11:05Z [----] followers, [---] engagements
"Splunk - Threat Hunting for PowerShell Execution Splunk - Threat Hunting for PowerShell Execution SPL Queries used Here : Windows login event via Powershell as a channel sourcetype="threathunting*" Channel IN ("Microsoft-Windows-PowerShell/Operational") EventID=4103 table Channel _time Hostname sort -_time Non-Interactive mode Powershell spawned from some other process sourcetype="threathunting**" EventID=4688 NewProcessName="*powershell.exe*" ParentProcessName="*explorer.exe*" stats count by EventID NewProcessName ParentProcessName SubjectUserName SubjectDomainName _time Event ID = 7"
[YouTube Link](https://youtube.com/watch?v=2HXYIhbGjCg) 2022-06-18T13:52Z [----] followers, [----] engagements
"Part [--] of Chapter [--] - Simple hello application using node container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Node.js Applications in Docker #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=0vaIPiMIISk) 2022-06-17T05:33Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Node.js Container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Node.js Applications in Docker #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=jxfiV5oNuLQ) 2022-06-17T05:31Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Simple Python Program using container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Python Applications using container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=xj9Yk-5pEoY) 2022-06-17T05:25Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Creating Python Containers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Python Applications using container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=xt5Wd5SmX-I) 2022-06-17T05:22Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Cleaning Up Stopped Containers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Conatiner Management (Ubuntu nginx) discussing various flags -d -i -t while creating containers #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=ltlfHTXkRUo) 2022-06-17T05:14Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Multiple Nginx Servers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=llGthuvBVtw) 2022-06-17T04:55Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Creating Multiple Ubuntu Containers from the Same Image The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers (Container management Ubuntu Nginx) #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=oyFmNR7WDaM) 2022-06-17T04:52Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Container with Pseudo TTY The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers VIDEO : Running Container with Pseudo TTY #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=_ZjdnfW98eY) 2022-06-17T04:46Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Containers in Background The Complete Docker Hands on Series - Chapter [--] - Discussing various flags -d -i -t For all devops people who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Containers in Background #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=hLQHEebr0UA) 2022-06-16T07:16Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Using Path Variable in Volume Mapping The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Using Path Variable in Volume Mapping #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=Wkb7jtm8q1M) 2022-06-16T06:49Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Nginx Container with Custom Content The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Nginx Container with Custom Content #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=6QyDVWDc4QY) 2022-06-16T06:47Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Alpine Versus Busybox The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Alpine Versus Busybox Images #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=BEbloy2CrWU) 2022-06-16T06:44Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Nginx with Exposed Port The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Nginx with Exposed Port #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=bazSnr5fp8M) 2022-06-16T06:44Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running #Busybox #Container The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Busybox Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=w9wVnTrGSbI) 2022-06-16T06:38Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Ubuntu Container The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Ubuntu Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=do3WneNKalg) 2022-06-16T06:34Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Hello-World #Container The Complete Docker Hands on Series - For all devops people who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter one : Running containers Basics [--] : Running Hello-World Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
[YouTube Link](https://youtube.com/watch?v=2ARg8lB1hPQ) 2022-06-16T06:30Z [----] followers, [---] engagements
"Scanning Docker Containers with Grype #docker #container #containersecurity #cloudsecurity Scanning Docker Containers with Grype (Which is software composition analysis tool) We will pull docker image which is vulnerable. And scan this image using grype to find all the CVE's. #docker #container #containersecurity #cloudsecurity #docker #container #containersecurity #cloudsecurity"
[YouTube Link](https://youtube.com/watch?v=Xv48TWhAMyU) 2022-06-14T09:51Z [----] followers, [---] engagements
"Docker - CI/CD #docker #devops #container Creating CI/CD pipeline using docker containers PLEASE FOLLOW ALONG WITH ME textual slides here please download : https://github.com/chirag99969/dockercicd/raw/main/Dockercicd-handson.pdf Container [--] - Postgres Container [--] - Gogs ( local git hub repo) Container [--] - registry (local docker hub) Container [--] - jenkins 0:00 Introduction 1:05 Theory Concepts 2:45 Hands On started/Clone repo 3:05 Setting stage 3:56 Understanding docker-compose.yaml File for Postgres 5:20 Understanding docker-compose.yaml File for Gogs 6:25 Understanding docker-compose.yaml"
[YouTube Link](https://youtube.com/watch?v=lU3QDwhdNbE) 2022-05-30T11:43Z [----] followers, [---] engagements
"Splunk AWSSecurityDay2 #splunk #cybersecnerd #aws #cybersecurityanalyst #soc #siem cybersecnerd@gmail.com Day [--] - AWS S3 bucket mad public activities after bucket made public : S3 Access Logs 0:00 - Scene Setting 0:45 - Recollecting Day [--] 1:15 - Scenario Start 1:25 - S3 bucket made Public 2:55 - Explaining ACL permissions for s3 bucket 3:45 - What do we know 4:00 - Bucket activity post exposure 6:25 - WhiteHat hacker warning 6:48 - What do we know 8:08 - Demystify Web Infra using S3 bucket SPL Queries used : here https://github.com/chirag99969/splunk #splunk #cybersecurity #cloudsecurity #aws"
[YouTube Link](https://youtube.com/watch?v=RE9urazt9wo) 2022-05-28T12:43Z [----] followers, [---] engagements
"Splunk AWS Security Day1 #SOC #SIEM #splunk #aws #awssecurity Day [--] - AWS Compromised Keys what did we find in aws:cloudtrail logs. 0:00 -Scene Setting 2:30 - AWS Abuse Notice for Compromised Access Key 3:57 - eventName (command) Activities by Leaked Access Key 4:35 - Leaked Key usage over time 7:30 - Different Grouping 8:00 - Notice creation of permanent/temp credentials 9:55 - Successful events 12:53 - Attacker is retrieving information 13:52 - S3 Bucket is made public/exposed 16:00 - Explanation of S3 bucket permissions 17:15 - What do we know SPL Queries used : here"
[YouTube Link](https://youtube.com/watch?v=0uXj9KsfqAw) 2022-04-30T09:58Z [----] followers, [----] engagements
"Splunk - Analysing AWS VPC Flow logs #splunk #cloudsecurity #aws #soc #loganalysis Using Splunk to analyse AWS VPC Flow logs. It is essential for SOC Analyst to become familiar cloud data sources. 0:00 - Scene setting 1:15 - Anatomy of AWS VPC Flow logs 4:56 - Traffic in outbound direction 6:45 - Traffic in inbound direction 9:40 - Guarduty Findings - details external IP: 13.125.33.130 i.e. Brute force Scanner aws_account_id:XXXXXXXXXXXX internal IP:172.16.0.178 15:20 - RARE Countries 16:25 - Going Further Step 17:10 - All Connection Attempts Over Time To Amp Ports 20:10 - Anomaly detection -"
[YouTube Link](https://youtube.com/watch?v=DMK-I602Tps) 2022-04-25T16:20Z [----] followers, [----] engagements
"Investigating with #splunk #SOC Analyst boot camp Attack Website Defaced Cyber Kill Chain APT actor defaced Company Website SOC Analyst is investigating with Splunk. IOAs (Indicator of attacks) documented Cyber Kill chain phases 0:00 - Scene Setting 1:23 - what events do we have 1:45 - website defaced 2:20 - Finding external IP scanning our webserver (reconnaissance ) 14:50 - which webserver is the target (reconnaissance) 17:08 - Determine where brute force attempt is originated from (exploitation) 25:20 - compromised login password 29:00 - document IOA's for Exploitation phase in kill chain"
[YouTube Link](https://youtube.com/watch?v=ZRlIA-cXLxo) 2022-04-03T11:30Z [----] followers, [----] engagements
"Threat Hunting on Cloud using CloudTrail #splunk #aws #awssecurity #awscloudtrail #cybersecnerd Threat Hunting on Cloud using CloudTrail in Splunk Those interested in Cloudtrail logs (Threat Data) this configuration to play around or [--] Hours lab environment to practise SOCCLOUD skillset or training related requirement. Hit me at: cybersecnerd@gmail.com https://t.me/cybersecnerd #splunk #threathunting #threathuntingoncloud #aws #cybersecnerd #soc #soccloud #splunk #threathunting #threathuntingoncloud #aws #cybersecnerd #soc #soccloud"
[YouTube Link](https://youtube.com/watch?v=esm8LCmVSIk) 2021-10-26T15:01Z [----] followers, [----] engagements
"CrossAccountAccessViaIAMRole (AWS) Demo Granting access to IAM user residing in another AWS Account in the resources in our AWS Account. (Say IAM user in TEST AWS Account can access resources in PROD AWS Account) #aws #crossaccountaccess #iamrole #cloud #iam #aws #crossaccountaccess #iamrole #cloud #iam"
[YouTube Link](https://youtube.com/watch?v=Fx6NHD0JKqA) 2021-07-03T06:31Z [----] followers, [--] engagements
"Splunk -Threat Hunting Playbook [--] #splunk #splunkuser #splunkpoweruser #cybersecnerd #threathunting Splunk - Threat Hunting with Windows OS Logs (threat data) hypothesis: Adversaries might be using a non system account to access LSASS and extract credentials from memory. Reference Links: https://attack.mitre.org/techniques/T1003/001/ https://adsecurity.org/page_id=1821#SEKURLSALogonPasswords http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/ SPL Queries Used: [--]. Looking for non-system accounts getting a handle to and accessing"
[YouTube Link](https://youtube.com/watch?v=EmiT7JCpf_o) 2021-02-27T10:22Z [----] followers, [----] engagements
"Splunk - Threat Hunting with Web proxy logs #splunk #threathunting #SOC #splunkuser #splunkpoweruser SPLUNK - Threat Hunting with Web proxy data 00:00 - Introduction 1:07 - Technique: Count of http status codes per src_ip dest_ip pair ( may indicate beaconing) 3:10 - Technique: Count of http status codes per src_ip dest_ip pair ( may indicate beaconing) 4:20 - Technique: Sum of bytes (unusual) ( may indicate data exfiltration/beaconing) 5:30 - eventstats to filter out results 7:30 - Technique: http method (May indicate Data Exfiltration) 9:20 - Technique Ratio (POST/GET) ( may indicate data"
[YouTube Link](https://youtube.com/watch?v=BF4Kf3GjADs) 2021-02-19T04:34Z [----] followers, [----] engagements
"Splunk - Mastering SPL (4) Less Used BUT Impactful Commands 0:00 - Intro 1:10 - iplocation 4:00 - geostats 5:10 - xyseries 8:15 - addtotals 9:15 - addcoltotals 10:10 - bin 13:30 - erex 16:45 - coalesce 20:50 - tstats #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd"
[YouTube Link](https://youtube.com/watch?v=BOQ9xB4j3cM) 2021-01-23T13:44Z [----] followers, [----] engagements
"Splunk - Mastering SPL ( Most common Use Cases for operations) #splunk #splunkuser #splunkpoweruser #Splunking #Learning #Splunk #timechart #timewrap #timezoneissues #trendanalysis Use Cases for TechOps SecOps PlatformOps : Good Use Cases for day to day Operations Nearby Events ( i.e event immediately before server reboot ) Determine time zone in your raw data . Trend Analysis ( Avg log count for [--] days with each weekday divide an hour intervals) Trend Analysis for fine-tuning Alerts and Saved Searches Best represent data / using timechart timewrap chart and date_time fields 01:05 - _time v/s"
[YouTube Link](https://youtube.com/watch?v=7UNxrFYyzCQ) 2021-01-06T19:15Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Transforming and Streaming commands) Splunk - Mastering SPL (Transforming and Streaming commands). Develop a knack Distinct Count V/s estdc index=main sourcetype=access_combined_wcookie stats dc(clientip) AS "distinct client ips" BY Clause (Splitting) index=main sourcetype=access_combined_wcookie stats countBY method action categoryId Functions index=main sourcetype=access_combined_wcookie stats max(bytes) AS "Largest" min(bytes) AS "Smallest" avg(bytes) AS "Average" perc95(bytes) AS "95th percentile" Values/List for stats index=main"
[YouTube Link](https://youtube.com/watch?v=_5_mA11NLTQ) 2020-12-28T03:10Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Grouping and correlating) Splunk - Mastering SPL (Grouping and correlating) commands SPL : Transaction index=main sourcetype="access_combined_wcookie" transaction JSESSIONID stats max(duration) index=main sourcetype="access_combined_wcookie" transaction JSESSIONID clientip startswith="action=view" endswith="action=purchase" Subsearch index=main sourcetype="access_combined_wcookie" search index=main sourcetype="access_combined_wcookie" stats count by productId sort [--] count fields productId Append No of purchases for [--] days and for ALL TIME index=main"
[YouTube Link](https://youtube.com/watch?v=0egn0Iis_ks) 2020-12-26T12:55Z [----] followers, [----] engagements
"AWS KMS Practical Demo KMS - Practical Demonstration AWS Security Specialty reference material (link will expire within three days as on 22nd Dec) https://forcybercumcloudpros.s3.ap-south-1.amazonaws.com/AWSSecSpecialty2020.pdfX-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA266XQ2YLVZTW4NML%2F20201219%2Fap-south-1%2Fs3%2Faws4_request&X-Amz-Date=20201219T111006Z&X-Amz-Expires=259200&X-Amz-SignedHeaders=host&X-Amz-Signature=1fa5f05ccc26308c4d0c259668740c028a6539635cb1a83f94c5ccbdb6efc218 #AWS #KMS #AWSKMS #encryption #SSE #CSE #AWSSecuritySpecialty #CERT #AWSSecurity #KeyManagementService"
[YouTube Link](https://youtube.com/watch?v=zxA2PLYglMM) 2020-11-02T03:21Z [----] followers, [---] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@cybersecnerd cybersecnerdcybersecnerd posts on YouTube about splunk, for all, gain, main the most. They currently have [-----] followers and [--] posts still getting attention that total [---] engagements in the last [--] hours.
Social category influence technology brands
Social topic influence splunk #12, for all, gain, main, repo, image, pdf, cloud, hero, port
Top accounts mentioned or mentioned by @telegram @gmailcom @timestamp
Top posts by engagements in the last [--] hours
"Splunk - Mastering SPL (Grouping and correlating) Splunk - Mastering SPL (Grouping and correlating) commands SPL : Transaction index=main sourcetype="access_combined_wcookie" transaction JSESSIONID stats max(duration) index=main sourcetype="access_combined_wcookie" transaction JSESSIONID clientip startswith="action=view" endswith="action=purchase" Subsearch index=main sourcetype="access_combined_wcookie" search index=main sourcetype="access_combined_wcookie" stats count by productId sort [--] count fields productId Append No of purchases for [--] days and for ALL TIME index=main"
YouTube Link 2020-12-26T12:55Z [----] followers, [----] engagements
"Splunk - Threat Hunting for PowerShell Execution Splunk - Threat Hunting for PowerShell Execution SPL Queries used Here : Windows login event via Powershell as a channel sourcetype="threathunting*" Channel IN ("Microsoft-Windows-PowerShell/Operational") EventID=4103 table Channel _time Hostname sort -_time Non-Interactive mode Powershell spawned from some other process sourcetype="threathunting**" EventID=4688 NewProcessName="powershell.exe" ParentProcessName="explorer.exe" stats count by EventID NewProcessName ParentProcessName SubjectUserName SubjectDomainName _time Event ID = 7"
YouTube Link 2022-06-18T13:52Z [----] followers, [----] engagements
"Part [--] of Chapter [--] - Running Container with Pseudo TTY The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers VIDEO : Running Container with Pseudo TTY #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T04:46Z [----] followers, [---] engagements
"Docker - CI/CD #docker #devops #container Creating CI/CD pipeline using docker containers PLEASE FOLLOW ALONG WITH ME textual slides here please download : https://github.com/chirag99969/dockercicd/raw/main/Dockercicd-handson.pdf Container [--] - Postgres Container [--] - Gogs ( local git hub repo) Container [--] - registry (local docker hub) Container [--] - jenkins 0:00 Introduction 1:05 Theory Concepts 2:45 Hands On started/Clone repo 3:05 Setting stage 3:56 Understanding docker-compose.yaml File for Postgres 5:20 Understanding docker-compose.yaml File for Gogs 6:25 Understanding docker-compose.yaml"
YouTube Link 2022-05-30T11:43Z [----] followers, [---] engagements
"Practical Splunk Administration in [--] Hours #splunk #splunkadmin #cybersecnerd By seeing this VIDEO I am confident you will be able to perform all Splunk Administration tasks. Download the PDF as well : https://github.com/chirag99969/SPL/tree/main/splunk-admin-zero-to-hero -----------------------------------------Timeline--------------------------------------------------------------------- Introduction - 0:00 Course Intro/Curriculum - 1:55 Splunk Enterprise Components - 5:04 Splunk Licensing Options - 13:25 Managing License Violations - 18:41 OVERVIEW Working with Splunk Config files - 21:00"
YouTube Link 2023-05-19T16:30Z [----] followers, 10.9K engagements
"Splunk - Mastering SPL (4) Less Used BUT Impactful Commands 0:00 - Intro 1:10 - iplocation 4:00 - geostats 5:10 - xyseries 8:15 - addtotals 9:15 - addcoltotals 10:10 - bin 13:30 - erex 16:45 - coalesce 20:50 - tstats #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd"
YouTube Link 2021-01-23T13:44Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Transforming and Streaming commands) Splunk - Mastering SPL (Transforming and Streaming commands). Develop a knack Distinct Count V/s estdc index=main sourcetype=access_combined_wcookie stats dc(clientip) AS "distinct client ips" BY Clause (Splitting) index=main sourcetype=access_combined_wcookie stats countBY method action categoryId Functions index=main sourcetype=access_combined_wcookie stats max(bytes) AS "Largest" min(bytes) AS "Smallest" avg(bytes) AS "Average" perc95(bytes) AS "95th percentile" Values/List for stats index=main"
YouTube Link 2020-12-28T03:10Z [----] followers, [----] engagements
"Practical #Splunk - Zero to Hero #cybersecnerd Complete Hands-On - You will be splunk enthusiast in [--] Hours reachme @telegram username @cybersecnerd wanna skip theory - GO TO lesson [--] directly ALL SPL Queries : https://github.com/chirag99969/SPL/tree/main/splunk-zero-to-hero Lesson [--] IntroductionTABLE of contents - 0:00 Splunk architecture - 4:30 Splunk Downloadable links - 16:09 Installing Splunk- 19:30 Setting Splunk username/pasword - 24:40 Uploading Tutorial Data - 26:45 Lesson [--] Search Processing Language - 31:10 Introducing Splunk Interface - 31:30 Structure of SPL - 38:17 Running basic"
YouTube Link 2022-11-25T13:23Z [----] followers, 124.7K engagements
"Build Your First #splunk Dashboard #intellipaat #edureka Learn how to build dashboards in Splunk Quickly. Tutorial Dataset Links: https://docs.splunk.com/Documentation/SplunkCloud/9.0.2303/SearchTutorial/Systemrequirements#Download_the_tutorial_data_files ----------------- Timeline ---------------------------------------------------------------------------------------- Introduction - 0:00 Splunk Installation made easy - 1:00 Add data/Ingest data/Tutorial data - 2:04 Different sourcetypes - 4:00 Start creating Dashboard - 5:40 Creating multiple input Panels - 9:40 Customizing Dashboard - 12:05"
YouTube Link 2023-05-30T16:42Z [----] followers, [---] engagements
"Practical Splunk Administration in [--] Hours #splunk #splunkadmin #cybersecnerd By seeing this VIDEO I am confident you will be able to perform all Splunk Administration tasks. Download the PDF as well : https://github.com/chirag99969/SPL/tree/main/splunk-admin-zero-to-hero -----------------------------------------Timeline--------------------------------------------------------------------- Introduction - 0:00 Course Intro/Curriculum - 1:55 Splunk Enterprise Components - 5:04 Splunk Licensing Options - 13:25 Managing License Violations - 18:41 OVERVIEW Working with Splunk Config files - 21:00"
YouTube Link 2023-05-19T16:30Z [----] followers, 10.9K engagements
"Learn chatGPT in [--] mins #chatgpt #genrative #ai ChatGPT in [--] mins: ✅ Learning Objectives ✅ Evolution of ChatGPT ✅ Time to reach 100M Users ✅ Generative AI seeing mass adoption ✅ What is ChatGPT ✅ What ChatGPT is trained on ✅ Interacting with ChatGPT ✅ Basic Prompting ✅ Prompting V/S Asking ✅ Role Prompting ✅ Multi-Faceted Prompting ✅ Examples of Writing Style ✅ Use Punctuation ✅ ChatGPT limitations ✅ JAILBREAK Prompt ✅ Evaluate your RESUME ✅ Evaluate your Linked IN Profile ✅ Conclusion Music: bensound.com License code: GXKNI4QXTDMNCFUT #chatgpt #ai #openai #generative #cybersecnerd #chatgpt"
YouTube Link 2023-05-09T06:56Z [----] followers, [---] engagements
"Git and GitHub Crash course in an Hour Master Git in an Hour. Push and Pull Changes to GitHub repository. -------------------------TimeLine----------------------------------------------- Git Crash couse Intro - 0:00 Getting started with git - 1:12 Committing changes to git (All Practical from this section) - 4:33 Set Author name and Email before committing - 8:36 First git commit - 11:06 Explore Commit History - 12:40 Git commands - 16:12 Checking out commit and branches - 17:42 File tracking statuses decoded - 21:56 Merging Branches - 28:05 Explore commit tree using graph - 36:13 Git push to"
YouTube Link 2023-04-28T04:40Z [----] followers, [---] engagements
"Kubernetes in [--] Hours (All Practical) Illustrative Diagrams and Visualizations to explain Services and Storage ALL commads used here : https://github.com/chirag99969/kubernetes Section [--] Understanding kubernetes - 0:00 Kubernetes Host Platform - 4:36 Kubernetes ecosystem - 6:24 Setting up minikube on ec2 (ubuntu) in [--] mins - 10:51 minikube start - 17:00 kubectl TAB completion - 18:50 kubernetes resources - 21:00 kubectl TAB completion cmd - 24:09 kubectl api-resources - 24:41 PODS and Deployments DEMO - 26:25 namespaces - 39:11 DEMO - Troubleshooting pods - 42:40 DEMO - Service (Illustrative"
YouTube Link 2023-03-18T11:49Z [----] followers, [----] engagements
"Practical #Splunk - Zero to Hero #cybersecnerd Complete Hands-On - You will be splunk enthusiast in [--] Hours reachme @telegram username @cybersecnerd wanna skip theory - GO TO lesson [--] directly ALL SPL Queries : https://github.com/chirag99969/SPL/tree/main/splunk-zero-to-hero Lesson [--] IntroductionTABLE of contents - 0:00 Splunk architecture - 4:30 Splunk Downloadable links - 16:09 Installing Splunk- 19:30 Setting Splunk username/pasword - 24:40 Uploading Tutorial Data - 26:45 Lesson [--] Search Processing Language - 31:10 Introducing Splunk Interface - 31:30 Structure of SPL - 38:17 Running basic"
YouTube Link 2022-11-25T13:23Z [----] followers, 124.7K engagements
"Setup #minikube cluster in [--] minutes Setting up minikube can be troublesome See this video use this shell script you can have minikube cluster up and running in just [--] minutes. JUST execute this shell script. github repo : https://github.com/chirag99969/ckad-exercises/blob/main/minikube-docker-setup.sh time stamps: 0:00 : Introduction 0:35 : Creating Ubuntu machine on AWS 3:15 : Execute the shell script have you minikube cluster ready in a minute Prerequisites: Ubuntu Server [-----] LTS Minimum 2vCPUs Min 4GB RAM Disk Size : I am using [--] GB (Would suggest make it [--] GB) #k8s #minikube #devops"
YouTube Link 2022-11-14T06:49Z [----] followers, [---] engagements
"CKAD Exercise [--] Health Check Readiness Probe and Liveness Probe Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Readiness Probe and Liveness Probe: 👉 Create a new Pod named hello that exposes the port [----]. Provide the name nodejs-port for the container port. 👉 Add a Readiness Probe that checks the URL path / on the port referenced with the name nodejs-port after a [--] seconds delay. You do not have to define the period interval. 👉 Add a Liveness Probe that verifies that the app is up and running every [--] seconds by"
YouTube Link 2022-10-10T13:42Z [----] followers, [---] engagements
"CKAD Exercise [--] adapter pattern formatting logs using side car Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises 👉 The business application running the main container produces timestamped informationin this case the available disk spaceand writes it to the file diskspace.txt. 👉 As part of the architecture we want to consume the file from a third-party monitoring application. The problem is that the external application requires the information to exclude the timestamp. 👉 Now we could change the logging format to"
YouTube Link 2022-10-10T13:35Z [----] followers, [--] engagements
"CKAD Exercise [--] side car container for logging Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Side Car container: 👉 The sidecar container polls the files error.log periodically and checks if any failures have been discovered. 👉 More specifically the service tries to find failures assigned to the error log level indicated by error in the log file. If an error is found the monitoring service will react to it. 👉 For example it could send a notification to the administrators of the system. Well keep the"
YouTube Link 2022-10-10T13:30Z [----] followers, [---] engagements
"CKAD Exercise [--] Define Pod Resource Requirements Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo : https://github.com/chirag99969/ckad-exercises/tree/main/exercises Defining a Pods Resource Requirements Create a new Pod that exceeds the limits of the resource quota requirements e.g. by defining 1Gi of memory but stays below the CPU e.g. [---]. Write down the error message. Change the request limits to fulfill the requirements to ensure that the Pod could be created successfully. Write down the output of the command that renders the used amount of resources for the namespace. #cncf"
YouTube Link 2022-09-21T06:01Z [----] followers, [--] engagements
"CKAD Exercise [--] Create security context for pod Minikube Setup : https://youtu.be/ZTO1doC8SOc repo: https://github.com/chirag99969/ckad-exercises/tree/main/exercises Creating a Security Context for a Pod Create a Pod named secured that uses the image nginx for a single container. Mount an emptyDir volume to the directory /data/app. Files created on the volume should use the filesystem group ID [----]. Get a shell to the running container and create a new file named logs.txt in the directory /data/app. List the contents of the directory and write them down. #cncf #k8s #ckad #devops #cncf #k8s"
YouTube Link 2022-09-21T05:56Z [----] followers, [---] engagements
"CKAD Exercise [--] Configure a pod using secret Minikube Setup : https://youtu.be/ZTO1doC8SOc github repo: https://github.com/chirag99969/ckad-exercises/tree/main/exercises Configuring a Pod to Use a Secret Create a new Secret named db-credentials with the key/value pair db-password=passwd. Create a Pod named backend that uses the Secret as environment variable named DB_PASSWORD and runs the container with the image nginx. Shell into the Pod and print out the created environment variables. You should find DB_PASSWORD variable. #cncf #k8s #ckad #devops #cncf #k8s #ckad #devops"
YouTube Link 2022-09-21T05:52Z [----] followers, [--] engagements
"CKAD Exercise [--] Creating Using configmap Minikube Setup : https://youtu.be/ZTO1doC8SOc Create a new file named config.txt with the following environment variables as key/value pairs on each line. o DB_URL equates to localhost:3306 o DB_USERNAME equates to postgres Create a new ConfigMap named db-config from that file. Create a Pod named backend that uses the environment variables from the ConfigMap and runs the container with the image nginx. Shell into the Pod and print out the created environment variables. You should find DB_URL and DB_USERNAME with their appropriate values. #ckad #cncf"
YouTube Link 2022-09-20T11:27Z [----] followers, [--] engagements
"CKAD Exercise [--] Create Inspect Pod Minikube Setup : https://youtu.be/ZTO1doC8SOc Creating a pod and Inspecting it : Create the namespace ckad-prep. In the namespace ckad-prep create a new Pod named mypod with the image nginx:2.3.5. Expose the port [--]. Identify the issue with creating the container. Write down the root cause of issue in a file named pod-error.txt. Change the image of the Pod to nginx:1.15.12. List the Pod and ensure that the container is running. Log into the container and run the ls command. Write down the output. Log out of the container. Retrieve the IP address of the Pod"
YouTube Link 2022-09-20T11:19Z [----] followers, [---] engagements
"Practical #kubernetes in [--] hours Practical #kubernetes in [--] hours (zero to hero) Full hands On minimal essential theory (Skip first [--] mins of theory if you wish) Lab Setup (my environment) : https://youtu.be/ZTO1doC8SOc 00:00 k8s terms concepts brief 06:56 Creating Cluster using minikube and Exploring k8s nodes 11:38 Pods creation 20:26 Deployment creation 28:40 Service creation 36:36 Creating Node Web Application 39:17 Dockerizing Node Application/building docker image/pushing to docker hub 43:55 Creating deployment based on custom docker image 49:00 Scaling Custom image deployment 53:38"
YouTube Link 2022-07-25T14:06Z [----] followers, [---] engagements
"Practical #kubernetes lab setup #minikube on #ubuntu [----] OR [-----] Practical Kubernetes in [--] Hours: LAB setup in ubuntu [-----] LTS OR [-----] LTS (All commands used below agenda) Agenda for this playlist: K8s Local Development Minikube setup on Ubuntu [-----] LTS OR [-----] LTS (VS Code Remote SSH) K8s Terms terminologies K8 Cluster Pod Creation Deployment creation Service creation Running Node.js app using K8 Rolling Updates and Pod discovery YAML spec files Multi Deployment creation Interaction between deployments LAB setup in ubuntu [-----] LTS Commands : sudo apt-get update -y sudo apt-get upgrade"
YouTube Link 2022-07-23T13:15Z [----] followers, [----] engagements
"#splunk - #threathunting Privilege Escalation Hypothesis : Adversary can query instance metadata for misconfigured Ec2 acting as Proxy to retrieve temporary credentials. Scenario : Attacker retrieved temporary credentials which he later used to exfiltrate data from S3 Bucket SPL : Activities from outside our network index="aws-test" sourcetype="_json" search NOT sourceIPAddress IN (10.0.0.0/8 192.168.0.0/16 172.16.0.0/12) Activities performed by this sourceIP: index="aws-test" sourcetype="_json" sourceIPAddress="1.2.3.4" stats count values(eventName) by userIdentity.arn"
YouTube Link 2022-06-19T11:05Z [----] followers, [---] engagements
"Splunk - Threat Hunting for PowerShell Execution Splunk - Threat Hunting for PowerShell Execution SPL Queries used Here : Windows login event via Powershell as a channel sourcetype="threathunting*" Channel IN ("Microsoft-Windows-PowerShell/Operational") EventID=4103 table Channel _time Hostname sort -_time Non-Interactive mode Powershell spawned from some other process sourcetype="threathunting**" EventID=4688 NewProcessName="powershell.exe" ParentProcessName="explorer.exe" stats count by EventID NewProcessName ParentProcessName SubjectUserName SubjectDomainName _time Event ID = 7"
YouTube Link 2022-06-18T13:52Z [----] followers, [----] engagements
"Part [--] of Chapter [--] - Simple hello application using node container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Node.js Applications in Docker #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T05:33Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Node.js Container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Node.js Applications in Docker #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T05:31Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Simple Python Program using container The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Python Applications using container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T05:25Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Creating Python Containers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Running Python Applications using container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T05:22Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Cleaning Up Stopped Containers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Conatiner Management (Ubuntu nginx) discussing various flags -d -i -t while creating containers #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T05:14Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Multiple Nginx Servers The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T04:55Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Creating Multiple Ubuntu Containers from the Same Image The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers (Container management Ubuntu Nginx) #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T04:52Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Container with Pseudo TTY The Complete Docker Hands on Series - Audience : For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter [--] - Discussing various flags -d -i -t while creating containers VIDEO : Running Container with Pseudo TTY #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-17T04:46Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Containers in Background The Complete Docker Hands on Series - Chapter [--] - Discussing various flags -d -i -t For all devops people who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Containers in Background #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T07:16Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Using Path Variable in Volume Mapping The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Using Path Variable in Volume Mapping #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:49Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Nginx Container with Custom Content The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Nginx Container with Custom Content #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:47Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Alpine Versus Busybox The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Alpine Versus Busybox Images #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:44Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Nginx with Exposed Port The Complete Docker Hands on Series - Chapter [--] - We discuss port mapping and Volume mapping for Docker Containers For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Nginx with Exposed Port #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:44Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running #Busybox #Container The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Busybox Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:38Z [----] followers, [---] engagements
"Part [--] of Chapter [--] - Running Ubuntu Container The Complete Docker Hands on Series - For all devops who wants to gain practical/Hands on knowledge and experience with docker containers. [--] : Running Ubuntu Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:34Z [----] followers, [--] engagements
"Part [--] of Chapter [--] - Running Hello-World #Container The Complete Docker Hands on Series - For all devops people who wants to gain practical/Hands on knowledge and experience with docker containers. Chapter one : Running containers Basics [--] : Running Hello-World Container #devops #docker #containers #devsecops #devops #docker #containers #devsecops"
YouTube Link 2022-06-16T06:30Z [----] followers, [---] engagements
"Scanning Docker Containers with Grype #docker #container #containersecurity #cloudsecurity Scanning Docker Containers with Grype (Which is software composition analysis tool) We will pull docker image which is vulnerable. And scan this image using grype to find all the CVE's. #docker #container #containersecurity #cloudsecurity #docker #container #containersecurity #cloudsecurity"
YouTube Link 2022-06-14T09:51Z [----] followers, [---] engagements
"Docker - CI/CD #docker #devops #container Creating CI/CD pipeline using docker containers PLEASE FOLLOW ALONG WITH ME textual slides here please download : https://github.com/chirag99969/dockercicd/raw/main/Dockercicd-handson.pdf Container [--] - Postgres Container [--] - Gogs ( local git hub repo) Container [--] - registry (local docker hub) Container [--] - jenkins 0:00 Introduction 1:05 Theory Concepts 2:45 Hands On started/Clone repo 3:05 Setting stage 3:56 Understanding docker-compose.yaml File for Postgres 5:20 Understanding docker-compose.yaml File for Gogs 6:25 Understanding docker-compose.yaml"
YouTube Link 2022-05-30T11:43Z [----] followers, [---] engagements
"Splunk AWSSecurityDay2 #splunk #cybersecnerd #aws #cybersecurityanalyst #soc #siem cybersecnerd@gmail.com Day [--] - AWS S3 bucket mad public activities after bucket made public : S3 Access Logs 0:00 - Scene Setting 0:45 - Recollecting Day [--] 1:15 - Scenario Start 1:25 - S3 bucket made Public 2:55 - Explaining ACL permissions for s3 bucket 3:45 - What do we know 4:00 - Bucket activity post exposure 6:25 - WhiteHat hacker warning 6:48 - What do we know 8:08 - Demystify Web Infra using S3 bucket SPL Queries used : here https://github.com/chirag99969/splunk #splunk #cybersecurity #cloudsecurity #aws"
YouTube Link 2022-05-28T12:43Z [----] followers, [---] engagements
"Splunk AWS Security Day1 #SOC #SIEM #splunk #aws #awssecurity Day [--] - AWS Compromised Keys what did we find in aws:cloudtrail logs. 0:00 -Scene Setting 2:30 - AWS Abuse Notice for Compromised Access Key 3:57 - eventName (command) Activities by Leaked Access Key 4:35 - Leaked Key usage over time 7:30 - Different Grouping 8:00 - Notice creation of permanent/temp credentials 9:55 - Successful events 12:53 - Attacker is retrieving information 13:52 - S3 Bucket is made public/exposed 16:00 - Explanation of S3 bucket permissions 17:15 - What do we know SPL Queries used : here"
YouTube Link 2022-04-30T09:58Z [----] followers, [----] engagements
"Splunk - Analysing AWS VPC Flow logs #splunk #cloudsecurity #aws #soc #loganalysis Using Splunk to analyse AWS VPC Flow logs. It is essential for SOC Analyst to become familiar cloud data sources. 0:00 - Scene setting 1:15 - Anatomy of AWS VPC Flow logs 4:56 - Traffic in outbound direction 6:45 - Traffic in inbound direction 9:40 - Guarduty Findings - details external IP: 13.125.33.130 i.e. Brute force Scanner aws_account_id:XXXXXXXXXXXX internal IP:172.16.0.178 15:20 - RARE Countries 16:25 - Going Further Step 17:10 - All Connection Attempts Over Time To Amp Ports 20:10 - Anomaly detection -"
YouTube Link 2022-04-25T16:20Z [----] followers, [----] engagements
"Investigating with #splunk #SOC Analyst boot camp Attack Website Defaced Cyber Kill Chain APT actor defaced Company Website SOC Analyst is investigating with Splunk. IOAs (Indicator of attacks) documented Cyber Kill chain phases 0:00 - Scene Setting 1:23 - what events do we have 1:45 - website defaced 2:20 - Finding external IP scanning our webserver (reconnaissance ) 14:50 - which webserver is the target (reconnaissance) 17:08 - Determine where brute force attempt is originated from (exploitation) 25:20 - compromised login password 29:00 - document IOA's for Exploitation phase in kill chain"
YouTube Link 2022-04-03T11:30Z [----] followers, [----] engagements
"Threat Hunting on Cloud using CloudTrail #splunk #aws #awssecurity #awscloudtrail #cybersecnerd Threat Hunting on Cloud using CloudTrail in Splunk Those interested in Cloudtrail logs (Threat Data) this configuration to play around or [--] Hours lab environment to practise SOCCLOUD skillset or training related requirement. Hit me at: cybersecnerd@gmail.com https://t.me/cybersecnerd #splunk #threathunting #threathuntingoncloud #aws #cybersecnerd #soc #soccloud #splunk #threathunting #threathuntingoncloud #aws #cybersecnerd #soc #soccloud"
YouTube Link 2021-10-26T15:01Z [----] followers, [----] engagements
"CrossAccountAccessViaIAMRole (AWS) Demo Granting access to IAM user residing in another AWS Account in the resources in our AWS Account. (Say IAM user in TEST AWS Account can access resources in PROD AWS Account) #aws #crossaccountaccess #iamrole #cloud #iam #aws #crossaccountaccess #iamrole #cloud #iam"
YouTube Link 2021-07-03T06:31Z [----] followers, [--] engagements
"Splunk -Threat Hunting Playbook [--] #splunk #splunkuser #splunkpoweruser #cybersecnerd #threathunting Splunk - Threat Hunting with Windows OS Logs (threat data) hypothesis: Adversaries might be using a non system account to access LSASS and extract credentials from memory. Reference Links: https://attack.mitre.org/techniques/T1003/001/ https://adsecurity.org/page_id=1821#SEKURLSALogonPasswords http://clymb3r.wordpress.com/2013/04/09/modifying-mimikatz-to-be-loaded-using-invoke-reflectivedllinjection-ps1/ SPL Queries Used: [--]. Looking for non-system accounts getting a handle to and accessing"
YouTube Link 2021-02-27T10:22Z [----] followers, [----] engagements
"Splunk - Threat Hunting with Web proxy logs #splunk #threathunting #SOC #splunkuser #splunkpoweruser SPLUNK - Threat Hunting with Web proxy data 00:00 - Introduction 1:07 - Technique: Count of http status codes per src_ip dest_ip pair ( may indicate beaconing) 3:10 - Technique: Count of http status codes per src_ip dest_ip pair ( may indicate beaconing) 4:20 - Technique: Sum of bytes (unusual) ( may indicate data exfiltration/beaconing) 5:30 - eventstats to filter out results 7:30 - Technique: http method (May indicate Data Exfiltration) 9:20 - Technique Ratio (POST/GET) ( may indicate data"
YouTube Link 2021-02-19T04:34Z [----] followers, [----] engagements
"Splunk - Mastering SPL (4) Less Used BUT Impactful Commands 0:00 - Intro 1:10 - iplocation 4:00 - geostats 5:10 - xyseries 8:15 - addtotals 9:15 - addcoltotals 10:10 - bin 13:30 - erex 16:45 - coalesce 20:50 - tstats #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd #splunk #SPL #splunker #masteringspl #splunkpoweruser #splunkuser #cybersecnerd"
YouTube Link 2021-01-23T13:44Z [----] followers, [----] engagements
"Splunk - Mastering SPL ( Most common Use Cases for operations) #splunk #splunkuser #splunkpoweruser #Splunking #Learning #Splunk #timechart #timewrap #timezoneissues #trendanalysis Use Cases for TechOps SecOps PlatformOps : Good Use Cases for day to day Operations Nearby Events ( i.e event immediately before server reboot ) Determine time zone in your raw data . Trend Analysis ( Avg log count for [--] days with each weekday divide an hour intervals) Trend Analysis for fine-tuning Alerts and Saved Searches Best represent data / using timechart timewrap chart and date_time fields 01:05 - _time v/s"
YouTube Link 2021-01-06T19:15Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Transforming and Streaming commands) Splunk - Mastering SPL (Transforming and Streaming commands). Develop a knack Distinct Count V/s estdc index=main sourcetype=access_combined_wcookie stats dc(clientip) AS "distinct client ips" BY Clause (Splitting) index=main sourcetype=access_combined_wcookie stats countBY method action categoryId Functions index=main sourcetype=access_combined_wcookie stats max(bytes) AS "Largest" min(bytes) AS "Smallest" avg(bytes) AS "Average" perc95(bytes) AS "95th percentile" Values/List for stats index=main"
YouTube Link 2020-12-28T03:10Z [----] followers, [----] engagements
"Splunk - Mastering SPL (Grouping and correlating) Splunk - Mastering SPL (Grouping and correlating) commands SPL : Transaction index=main sourcetype="access_combined_wcookie" transaction JSESSIONID stats max(duration) index=main sourcetype="access_combined_wcookie" transaction JSESSIONID clientip startswith="action=view" endswith="action=purchase" Subsearch index=main sourcetype="access_combined_wcookie" search index=main sourcetype="access_combined_wcookie" stats count by productId sort [--] count fields productId Append No of purchases for [--] days and for ALL TIME index=main"
YouTube Link 2020-12-26T12:55Z [----] followers, [----] engagements
"AWS KMS Practical Demo KMS - Practical Demonstration AWS Security Specialty reference material (link will expire within three days as on 22nd Dec) https://forcybercumcloudpros.s3.ap-south-1.amazonaws.com/AWSSecSpecialty2020.pdfX-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=AKIA266XQ2YLVZTW4NML%2F20201219%2Fap-south-1%2Fs3%2Faws4_request&X-Amz-Date=20201219T111006Z&X-Amz-Expires=259200&X-Amz-SignedHeaders=host&X-Amz-Signature=1fa5f05ccc26308c4d0c259668740c028a6539635cb1a83f94c5ccbdb6efc218 #AWS #KMS #AWSKMS #encryption #SSE #CSE #AWSSecuritySpecialty #CERT #AWSSecurity #KeyManagementService"
YouTube Link 2020-11-02T03:21Z [----] followers, [---] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/youtube::cybersecnerd