AWS

Objectives:

  • AWS Service Exploration: Gain practical experience in the assessment of AWS services, including EC2, S3, Lambda, RDS, IAM, ECR, ECS, Cognito, and many more, discovering their unique security challenges.

  • AWS Service Common Misconfigurations: Understand the common misconfigurations prevalent across a variety of AWS services, gaining insights into the vulnerabilities they introduce.

  • Threats Associated with AWS Services: Explore the diverse range of threats that can target AWS services, from identity and access management (IAM) to storage and computation.

  • Exploitation: Develop proficiency in multiple techniques for exploiting misconfigurations and vulnerabilities, ensuring participants can identify and address these threats effectively.

  • Tools and Techniques: Acquire a toolkit of essential tools and techniques to streamline the security assessment and pen-testing process, enabling efficient identification and mitigation of security risks.

  • Cross-Cloud Analysis: Extend your security expertise beyond AWS by exploring security challenges, vulnerabilities, and attack vectors in other prominent cloud platforms like Azure and GCP.

Last updated