On Security public CISSP Notes: 1.9 Risk management Jonathan Peña These are personal notes from my ongoing pursuit to obtain the CISSP certification sometime in 2025. 6 min read Dec 16, 2024
Kubernetes public Bootstrapping an etcd Cluster for Kubernetes Jonathan Peña Your team is working on setting up a new Kubernetes cluster. Because etcd is one of the necessary components of… 3 min read Oct 3, 2024
Kubernetes public Bootstrapping a Kubernetes Control Plane Jonathan Peña Context: Your team is working on setting up a new Kubernetes cluster. The necessary certificates and kubeconfigs have been provisioned,… 7 min read Oct 3, 2024
On Security public Prepare for a Cyber Crisis Management Plan Jonathan Peña Overall Get Ready The goal of such a method is to provide guidelines for handling events or threats to the… 6 min read Sep 23, 2024
Kubernetes public Bootstrapping Worker Nodes Jonathan Peña The process of setting up Kubernetes worker nodes involves configuring key services such as kubelet, kube-proxy, and containerd, alongside installing… 7 min read Sep 23, 2024
Kubernetes public Generating Data Encryption at Rest Jonathan Peña Your team is working on setting up a Kubernetes cluster with two controllers and two worker nodes. In order to… 2 min read Sep 23, 2024
Kubernetes public Generating Base Kubeconfigs Jonathan Peña In this lab walkthrough, your team is setting up a new Kubernetes cluster with two controllers and two worker nodes.… 4 min read Sep 19, 2024
Kubernetes public Creating Self-Signed Certificates Jonathan Peña Your team is currently setting up a Kubernetes cluster that consists of two worker nodes and two controller nodes. Your… 7 min read Sep 6, 2024
Lets Defend public SOC165 - Possible SQL Injection Payload Detected Walkthrough Jonathan Peña So let's start with the basics. You are on call, you receive this alert, the first question you… 5 min read Aug 27, 2024
Kubernetes public Repairing Failed Pods Jonathan Peña In this hands-on exercise, we will troubleshoot a Kubernetes deployment issue within the web namespace. Starting with an overview of… 3 min read Aug 21, 2024
On Security public Writing a Report on a Security Incident Jonathan Peña Reports must be written in a certain standard; the reader can guess whether the information they want is in the… 3 min read Aug 16, 2024
Lets Defend public Exploiting GTFOBins: The use of Sudo Jonathan Peña Sudo is the application that is used to run existing applications as a superuser (root) or different user privileges on… 2 min read Aug 15, 2024