When you're the biggest cloud provider in the world, you're also the biggest target for cybersecurity attacks. Amazon Web Services (AWS) knows what we're talking about.
A security solution can only work if it's both effective and massively scalable.
Cover all your bases by training for Attack AND Defense, learn how to secure the top AWS services like EC2, EKS & more, and do all of it hands-on.
With companies moving and operating extensively on the AWS Cloud, security remains a key challenge for professionals and organizations everywhere. This training is an extensive deep-dive into Attack, Detect and Defense implementations within AWS. The training is dedicated to cookbook-style “Attack, Detect and Defence” cyber-ranges.The aim of this training is to take the participant through a journey of highly practical, scalable and granular knowledge of AWS offense, defense and security automation. Our fundamental objective is that, after walking out of this class, the participant should be able to immediately apply this knowledge to AWS environments in their workplace.
This class is an intense, deep-dive experience into Security on AWS. We’d like participants to explore practical implementations of full-fledged environments, rather than have a surface-level understanding of attack and defense in AWS. Participants will walk away with long-term access to our online training portal and labs.
Get your team a holistic understanding of AWS security: both offensive techniques and defensive measures
Understand an attacker’s perspective, exploiting vulnerabilities & spotting crucial weak points.
Align various AWS tools & services to achieve a highly effective cloud security deployment.
MITRE ATT&CK & common bug bounty techniques
Network security, IAM, Security Hub
Detection, alerts & analytics in AWS
CI/CD pipelines & security assessments
Crafted on Real-world training for product security teams
Hands-on Experience: Engage with real-world scenarios in a controlled, cloud-based lab environment to apply learning directly.
Immediate Application: Implement Threat Modeling tools and techniques instantly, enhancing retention and understanding.
Access to Specialized Tooling: Utilize advanced Threat Modeling software and LLMs without needing to set up or maintain the infrastructure.
Safe Learning Space: Experiment and learn from mistakes in a risk-free sandbox, encouraging exploration and innovation.
Basic understanding of application security principles.
Familiarity with software development and the software development lifecycle (SDLC).
Some experience in security practices and methodologies is beneficial
For a optimal learning experience in this course, participants should use a laptop with Windows 10/11, the latest macOS, or a modern Linux distribution, equipped with an Intel i5 processor or equivalent (i7 recommended), at least 8GB of RAM (16GB preferred), and 20GB of free disk space. A stable, high-speed internet connection is essential for accessing streaming content and cloud-based labs, alongside the latest versions of Google Chrome, Mozilla Firefox, or Safari with JavaScript enabled. Participants must have administrative rights to install necessary software and a modern code editor like Visual Studio Code.
10