Is securing AWS akin to securing traditional infrastructures? The short answer: no. The long answer is in this course.
There is a popular misconception that all services that are deployed in Cloud Environments are automatically secure. This is untrue. Cloud Environments can be vulnerable and exposed to compromise similar to self-hosted, on-prem environments. The major difference is that the techniques and approaches that attackers use to compromise on-prem environments differ from cloud-native deployments and environments. Security on Amazon Web Services is often treated similar to enterprise security, but this is not a scalable or effective strategy. Our trainings on AWS are designed to give you powerful hands-on and practical perspective of AWS Security and its implementations
The Attacking Cloud Native Stacks - AWS Class, is a hardcore, hands-on training that gives you a 100% offensive perspective of attacking cloud-native services on AWS environments. This training is a collection of techniques that is very useful to red-teamers, pentesters and other infosec professionals at large. Participants will learn various methods of Recon, Mapping, Vulnerability Discovery, Exploitation and Post-Exploitation techniques that are specific to Cloud-native environments on AWS. You will learn by deploying intentionally-vulnerable deployments on your AWS account and learn how you can exploit these vulnerabilities, perform Privilege Escalation on the cloud and use those techniques in real-world AWS environments
In our AWS Cloud Security Automation Class, we focus on automating cloud infrastructure, with security being front and center. The class is an intermediate/advanced deep-dive into automation techniques and implementation possibilities against traditional server-based stacks to more new-age micro service and Cloud-Native stacks.
- Training Attendee, Confidential (Premier University)
I like how the instructors include real world examples and incorporate it into a lab assignment. Our teachers were very knowledgeable about all the topics we covered and they were able to answer all questions asked, and they successfully helped troubleshoot technical issues some users were having with their respective systems
Our Application Security and Cloud Security programs is a regular feature at marquee application security conferences across the world.
What are the major concepts covered in this training?
The training covers a host of different concepts some of them being introduction to AWS, typical vulnerabilities in cloud deployments, AWS security features like IAM, securing containerised AWS environments, AWS lambda and continuous delivery with AWS.
Are there any practical sessions in this course or is it mostly theoretical?
This training includes a healthy mix of both theoretical and practical sessions. Therefore while new concepts introduced in the class are discussed in great detail it is followed by real world case studies and hands-on exercises.
Is this training more developer focused or is it security oriented?
The course is beneficial to both development and security teams alike as both offensive and defensive security considerations are covered in this training.
Understand how an unclaimed Amazon Web Services S3 bucket can escalate to a sub-domain takeover with corresponding mitigation strategies and best practices involved.
Amazon Inspector is a Vulnerability Scanning Service from Amazon that works in an “agent-based” mode against specific Operating Systems on EC2. More on its usage here.
If you are working with AWS Lambda (Serverless), chances are that you would be working with AWS’s NoSQL Database, DynamoDB. Learn about an attack scenario specific to DynamoDB.