Learn hands-on how to exploit AWS cloud misconfigurations and build practical skills with step-by-step walkthroughs, labs, and CTFs. This courses uses and teaches 4 primary tools:
- CloudGoat
- Pacu
- ChatGPT
- AWS CLI
CloudGoat enables you to deploy vulnerable-by-design AWS scenarios in your own environments, although we will be providing a couple of those scenarios as 1-click deploy 🧪 Cybr Hands-On Labs if you would rather not use your own environments. Not all of the scenarios will be available with our labs due to how vulnerable they are.
In addition to using the AWS command line interface (CLI), we’ll be using a cloud penetration testing tool called Pacu.
We will also be using ChatGPT by having it craft payloads, troubleshoot for us, and overall help us speed up and be more effective.
This course is primarily for individuals who want to perform security assessments of AWS environments and resources, or who want to learn what to do once they’ve gained access to a set of limited AWS credentials. There are a couple of scenarios that show how to gain initial access to credentials through misconfigurations, but this course is mostly focused on helping you find privilege escalation paths.