Learn about the unique characteristics associated with cloud technologies and core fundamentals required to use AWS.
✅ 🔗 AWS: Cloud 101
✅ 🔗 AWS Basic Concepts
Understand the parts of the identity and access management service to set a good foundation for attacking and defending this service.
✅ 🔗 Introduction to AWS IAM
✅ 🔗 IAM Principals
✅ 🚩 IAM Permissions
✅ 🚩 IAM Credentials
✅ 🔗 The Quest of Least Privilege
✅ 🔗 STS Credentials Lab
Explore security misconfiguration on commonly used AWS services, including EC2, S3, VPC and more.
✅ 🔗 AWS S3 - Attack and Defense
✅ 🔗 Amazon EC2 - Attack & Defense
✅ 🚩 AWS VPC - Attack and Defense
✅ 🚩 AWS VPC - Data Exfiltration
Serverless technologies are popular when designing infrastructure. Work with various AWS components to understand how they can be exploited.
✅ 🔗 AWS Lambda
✅ 🔗 Lambda - Data Exfiltration
✅ 🔗 AWS API Gateway
Put your understanding of IAM to practice by covering key concepts required to enumerate, exploit and persist across IAM.
✅ 🔗 AWS IAM Enumeration
✅ 🔗 AWS IAM Initial Access
