Cybr Courses Courses Search All Courses8 AlphabeticalNewly Created All CategoriesAdvancedApplication SecurityBeginnerCertificationsCloud SecurityCybersecurity FundamentalsEthical HackingIntermediateNetworking Security All InstructorsAldenChristopheJuan Not Enrolled 11 Lessons AWS Certified Security Specialty (SCS-C02) Course Christophe Let's get AWS Security Specialty Certified! Free 18 Lessons Beginner’s Guide to AWS CloudTrail for Security Christophe Get started with AWS CloudTrail: one of the most important security services that AWS offers. While the CloudTrail service is enabled by default when you create an AWS account, it's enabled with limited functionality that can leave you blind and can hinder your ability to investigate security incidents. For example, there's a very big difference between Management Events, Data Events, and Insights Events, and only one of those is enabled by default. This course will teach you those differences and the 3 main ways that CloudTrail records data so that you can make an informed decision about what you or your organization needs. After covering important concepts, we'll jump in hands-on and learn how to use CloudTrail's Event History, how to create your first trail, how to enable notifications with CloudWatch and SNS, how to use CloudTrail Insights, and how to work with CloudTrail Lake. Finally, you will learn how to secure your CloudTrail trails and log files with best practices using IAM, log file integrity, encryption, and the Security Hub Controls checklist. Whenever someone wants to get started with AWS security, coupled with our Introduction to AWS Security course, we highly recommend starting with this course and understanding CloudTrail. This service gives you visibility into your AWS environments, and without visibility, you do not have security. Free 35 Lessons IAM Privilege Escalation Labs Christophe Learn first-hand how attackers exploit IAM misconfigurations in AWS with tactics pulled from real case studies. This course is entirely made up of 🧪 Hands-On Labs with different scenarios that will teach you how to exploit some of the most dangerous IAM privilege escalation weaknesses. The final section is made up of Challenges that will test your new skills and knowledge by providing vulnerable environments for you to capture the flag with limited information and hints. Good luck and have fun! Not Enrolled 42 Lessons Incident Response with CloudTrail and Athena Christophe End-to-end project where you will learn how to configure your AWS environment for Incident Response using recommended best practices. This course will show you how to deploy and use IAM roles, CloudTrail Lake, and Amazon Athena to respond to two real-world scenarios: IAM credentials exposure to S3 data exfiltration IAM credentials exposure to EC2 cryptomining Free 6 Lessons Introduction to AWS Enumeration Christophe Learn the basics of AWS enumeration in this Hands-On Labs course. Enumeration is the process of identifying and cataloguing AWS resources and services in an environment. The purpose is to gain a comprehensive understanding of the AWS environment, which is a critical step in assessing its security posture. Enumeration is used by both ethical hackers and black hats, because it's one of the first steps in identifying potential vulnerabilities that can be exploited. It's a crucial process for effective cloud security management, because it will allow you to identify misconfigurations or other potential attack vectors that need to be addressed. This course will show you hands-on how to perform enumeration in AWS by walking through the basics and enumerating several very important AWS services that are often targeted by attackers. Not Enrolled 70 Lessons Introduction to AWS Security Christophe Learn how to secure your cloud infrastructure with our comprehensive Introduction to AWS Security course. Designed for beginners, this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats. Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing S3), network and infrastructure security, and monitoring & logging. Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab 🧪 exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console. Upon completion, you'll be awarded a certificate of completion. This certificate can be added to LinkedIn and can serve as a valuable asset when showcasing your skills to potential employers or clients. Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively! Not Enrolled 40 Lessons Pentesting AWS Environments with Pacu, CloudGoat, and ChatGPT Christophe Learn hands-on how to exploit AWS cloud misconfigurations and build practical skills with step-by-step walkthroughs, labs, and CTFs. This course uses and teaches 4 primary tools: CloudGoat Pacu ChatGPT AWS CLI CloudGoat enables you to deploy vulnerable-by-design AWS scenarios in your own environments, although we will be providing a couple of those scenarios as 1-click deploy 🧪 Cybr Hands-On Labs if you would rather not use your own environments. Not all of the scenarios will be available with our labs due to how vulnerable they are. In addition to using the AWS command line interface (CLI), we’ll be using a cloud penetration testing tool called Pacu. We will also be using ChatGPT by having it craft payloads, troubleshoot for us, and overall help us speed up and be more effective. This course is primarily for individuals who want to perform security assessments of AWS environments and resources, or who want to learn what to do once they’ve gained access to a set of limited AWS credentials. There are a couple of scenarios that show how to gain initial access to credentials through misconfigurations, but this course is mostly focused on helping you find privilege escalation paths. Not Enrolled 18 Lessons Practical Guide to AWS IAM Roles Christophe Learn how to use IAM Roles like the pros. This course answers questions like: What are IAM roles and how are they different from users? When should you use roles, and how? What are differences between trust policies, managed policies, and inline policies? What's an effective way to assume roles? How does role chaining work? How does cross-account access work? What is IAM Roles Anywhere and how does it work? What are service-linked roles, and how are they different from service roles? What are security implications of using roles? You'll also learn some helpful tips, tricks, and useful tools to make using roles easier and more effective. We start off with a few conceptual lessons to cover key concepts, and then we dive into practical hands-on learning. Not Enrolled 11 Lessons AWS Certified Security Specialty (SCS-C02) Course Christophe Let's get AWS Security Specialty Certified! Free 18 Lessons Beginner’s Guide to AWS CloudTrail for Security Christophe Get started with AWS CloudTrail: one of the most important security services that AWS offers. While the CloudTrail service is enabled by default when you create an AWS account, it's enabled with limited functionality that can leave you blind and can hinder your ability to investigate security incidents. For example, there's a very big difference between Management Events, Data Events, and Insights Events, and only one of those is enabled by default. This course will teach you those differences and the 3 main ways that CloudTrail records data so that you can make an informed decision about what you or your organization needs. After covering important concepts, we'll jump in hands-on and learn how to use CloudTrail's Event History, how to create your first trail, how to enable notifications with CloudWatch and SNS, how to use CloudTrail Insights, and how to work with CloudTrail Lake. Finally, you will learn how to secure your CloudTrail trails and log files with best practices using IAM, log file integrity, encryption, and the Security Hub Controls checklist. Whenever someone wants to get started with AWS security, coupled with our Introduction to AWS Security course, we highly recommend starting with this course and understanding CloudTrail. This service gives you visibility into your AWS environments, and without visibility, you do not have security. Free 35 Lessons IAM Privilege Escalation Labs Christophe Learn first-hand how attackers exploit IAM misconfigurations in AWS with tactics pulled from real case studies. This course is entirely made up of 🧪 Hands-On Labs with different scenarios that will teach you how to exploit some of the most dangerous IAM privilege escalation weaknesses. The final section is made up of Challenges that will test your new skills and knowledge by providing vulnerable environments for you to capture the flag with limited information and hints. Good luck and have fun! Not Enrolled 42 Lessons Incident Response with CloudTrail and Athena Christophe End-to-end project where you will learn how to configure your AWS environment for Incident Response using recommended best practices. This course will show you how to deploy and use IAM roles, CloudTrail Lake, and Amazon Athena to respond to two real-world scenarios: IAM credentials exposure to S3 data exfiltration IAM credentials exposure to EC2 cryptomining Free 6 Lessons Introduction to AWS Enumeration Christophe Learn the basics of AWS enumeration in this Hands-On Labs course. Enumeration is the process of identifying and cataloguing AWS resources and services in an environment. The purpose is to gain a comprehensive understanding of the AWS environment, which is a critical step in assessing its security posture. Enumeration is used by both ethical hackers and black hats, because it's one of the first steps in identifying potential vulnerabilities that can be exploited. It's a crucial process for effective cloud security management, because it will allow you to identify misconfigurations or other potential attack vectors that need to be addressed. This course will show you hands-on how to perform enumeration in AWS by walking through the basics and enumerating several very important AWS services that are often targeted by attackers. Not Enrolled 70 Lessons Introduction to AWS Security Christophe Learn how to secure your cloud infrastructure with our comprehensive Introduction to AWS Security course. Designed for beginners, this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats. Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing S3), network and infrastructure security, and monitoring & logging. Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab 🧪 exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console. Upon completion, you'll be awarded a certificate of completion. This certificate can be added to LinkedIn and can serve as a valuable asset when showcasing your skills to potential employers or clients. Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively! Not Enrolled 40 Lessons Pentesting AWS Environments with Pacu, CloudGoat, and ChatGPT Christophe Learn hands-on how to exploit AWS cloud misconfigurations and build practical skills with step-by-step walkthroughs, labs, and CTFs. This course uses and teaches 4 primary tools: CloudGoat Pacu ChatGPT AWS CLI CloudGoat enables you to deploy vulnerable-by-design AWS scenarios in your own environments, although we will be providing a couple of those scenarios as 1-click deploy 🧪 Cybr Hands-On Labs if you would rather not use your own environments. Not all of the scenarios will be available with our labs due to how vulnerable they are. In addition to using the AWS command line interface (CLI), we’ll be using a cloud penetration testing tool called Pacu. We will also be using ChatGPT by having it craft payloads, troubleshoot for us, and overall help us speed up and be more effective. This course is primarily for individuals who want to perform security assessments of AWS environments and resources, or who want to learn what to do once they’ve gained access to a set of limited AWS credentials. There are a couple of scenarios that show how to gain initial access to credentials through misconfigurations, but this course is mostly focused on helping you find privilege escalation paths. Not Enrolled 18 Lessons Practical Guide to AWS IAM Roles Christophe Learn how to use IAM Roles like the pros. This course answers questions like: What are IAM roles and how are they different from users? When should you use roles, and how? What are differences between trust policies, managed policies, and inline policies? What's an effective way to assume roles? How does role chaining work? How does cross-account access work? What is IAM Roles Anywhere and how does it work? What are service-linked roles, and how are they different from service roles? What are security implications of using roles? You'll also learn some helpful tips, tricks, and useful tools to make using roles easier and more effective. We start off with a few conceptual lessons to cover key concepts, and then we dive into practical hands-on learning. Get notified when we publish new courses