Huy Pham
Search
CTRL + K
Huy Pham
Search
CTRL + K
Learning
CVE
CVE-2021-40444
Hacking Notes
Rooting Vuln Boxes
Usage
Phishing
Gophish Template
Starbucks Phishing Email Template
Welcome
Welcome
Working
F5
NGINX Certification
Configuration - Demonstrate
Demonstrate how to configure certificates
Demonstrate how to configure logging
Demonstrate how to enable HTTPS and associated security settings
Demonstrate how to manage connections and bandwidth
Demonstrate how to restrict access
Configuration - Knowledge
Configure NGINX as a content cache server
Configure NGINX as a Load Balancer
Configure NGINX as a reverse proxy
Configure NGINX as a web server
Management
Demonstrate how to manage user permissions
Explain the NGINX configuration directory structure
Given a scenario identify when to use NGINX
Manage shared memory zones
Troubleshooting
Demonstrate how to stop, start, and reload NGINX binary
Troubleshoot basic use cases
Troubleshoot TLS security settings
Index
IBM
Guardium
POC
POC Template
POC Setup and Configuration checklist
PoC related stuff
IBM Qradar & Resilient
BP Training
Syllabus
Demo
SOAR to Suspicious Phishing Attack
Phishing Scenario (SIEM + SOAR)
Qradar SIEM
Issues
AppHost
Sizings
Qradar Base Licensing
Tips & Tricks
Resilient
Integration
Exchange 2019 onprem
Playbooks
Detect & Response to Suspicious Phishing Attack
AppHost Utilities