This post will cover the detailed step by step process to deploy Keycloak in a production environment using AWS EC2 Server. We will use Docker containers and Maria DB as the database. For securing the portal, we will use NGINX and certbot to generate Letsencrypt certificate. The steps can be broken down as following: Create a domain/subdomain to be used …
Read More »Learning and Resources
Top 10 High Value Cybersecurity Certifications for 2025 and beyond
Cybersecurity certifications will be among the most rewarding credentials in the coming years due to the escalating threat landscape and soaring demand for skilled professionals. As cyberattacks, data breaches, and ransomware incidents grow, companies are prioritizing cybersecurity investments, driving the need for certified experts who can effectively secure networks, cloud environments, and sensitive data. 1. Certified Information Systems Security Professional …
Read More »