AWS Hacking
Overview
Amazon Web Services is the most popular cloud service provider in the world offering hundreds of services. With a large number of businesses adopting cloud technologies like AWS, cyber practitioners must understand the security implications of moving to the cloud.
This pathway will give you hands on access with common misconfigurations across AWS environments and understand defensive mitigations to prevent these attacks including
-
identifying, enumerating and exploiting overly permissive IAM users, roles and policies
-
exploring serverless infrastructure and common attack vectors present within these services
-
exploiting weaknesses in the most common AWS services including S3, EC2, VPC and more
Select your module(s)
You can select the modules you want to learn. Theres a specific order in the learning curve for some obvious reason, unless you already know something and wants to go farther.
By the end of this course, you'll be at one step to get Certified in: