AWS security

About the course

In today's world more and more companies decide to move their businesses to a cloud. It means that the success of a company is more dependent on those cloud services. While some security responsibilities are taken by the provider, the configuration and management of the cloud environment is still among the duties of the customer. There are thousands of stories showing that this task is not a trivial one.
During the AWS security course you will learn key security concepts on how to stay secure and compliant using the AWS cloud. The course is designed to be as much practical as possible containing common pitfalls in form of hands-on labs. During the labs you do not only learn how to properly configure AWS services, but you will also find misconfigurations there from an attacker perspective and get to know how to fix it.
Furthermore, we will go through AWS security services -- what they are and how to use them effectively in order to detect and prevent any malicious action. The course also covers what to do once you already got hacked to better prepare you for meeting the wild world.


title: AWS security
duration: normal: 1.5 days (9hrs education time); extended: 2 days
developed by: Paweł Rzepa
delivery partner: Securing **


    AWS account (can be free tier)
    a laptop with:
      git (the exact repositories to clone will be provided before the course)
      AWS CLI


* -- available in the extended course version

Security Basics

    Shared Responsibility Model, Security in AWS

Identity Access Management & Security Policies

    IAM users, IAM groups, profile identities, IAM policies, roles
    Labs: privilege escalation in AWS

S3 security

    Bucket policies vs ACLs, conflicting policies, encryption, Cross Region Replication, S3 and CloudFront, pre-signed URLs
    Lab: detecting S3 misconfigurations and detecting leaks in stored data

Logging And Monitoring

    CloudTrail, CloudWatch, AWS Config, AWS Inspector & Trusted Advisor
    Labs: Bypassing CloudTrail, Setting up AWS Config and CloudWatch Events to prevent it

Virtual Private Clouds

    VPC, NAT instances vs NAT Gateways, NACLs vs Security Groups, Bastions, VPC Flow Logs
    Labs*: setting up VPC and data exfiltration

Infrastructure Security *

    KMS, Key Pairs in EC2 and LightSail, WAF, AWS Shield

Incidence Response in AWS

    Steps to take after being hacked or loosing keys, Reading CloudTrail logs, Pentesting in AWS, AWS Certificate Manager, AWS System Managers, Compliance in AWS


Last modified 2yr ago