In today's world more and more companies decide to move their businesses to a cloud. It means that the success of a company is more dependent on those cloud services. While some security responsibilities are taken by the provider, the configuration and management of the cloud environment is still among the duties of the customer. There are thousands of stories showing that this task is not a trivial one.
During the AWS security course you will learn key security concepts on how to stay secure and compliant using the AWS cloud. The course is designed to be as much practical as possible containing common pitfalls in form of hands-on labs. During the labs you do not only learn how to properly configure AWS services, but you will also find misconfigurations there from an attacker perspective and get to know how to fix it.
Furthermore, we will go through AWS security services -- what they are and how to use them effectively in order to detect and prevent any malicious action. The course also covers what to do once you already got hacked to better prepare you for meeting the wild world.
title: AWS security
duration: normal: 1.5 days (9hrs education time); extended: 2 days
developed by: Paweł Rzepa
delivery partner: Securing **
AWS account (can be free tier)
a laptop with:
git (the exact repositories to clone will be provided before the course)
* -- available in the extended course version
Shared Responsibility Model, Security in AWS
IAM users, IAM groups, profile identities, IAM policies, roles
Labs: privilege escalation in AWS
Bucket policies vs ACLs, conflicting policies, encryption, Cross Region Replication, S3 and CloudFront, pre-signed URLs
Lab: detecting S3 misconfigurations and detecting leaks in stored data
CloudTrail, CloudWatch, AWS Config, AWS Inspector & Trusted Advisor
Labs: Bypassing CloudTrail, Setting up AWS Config and CloudWatch Events to prevent it
VPC, NAT instances vs NAT Gateways, NACLs vs Security Groups, Bastions, VPC Flow Logs
Labs*: setting up VPC and data exfiltration
KMS, Key Pairs in EC2 and LightSail, WAF, AWS Shield
Steps to take after being hacked or loosing keys, Reading CloudTrail logs, Pentesting in AWS, AWS Certificate Manager, AWS System Managers, Compliance in AWS
pawel.rzepa @ securing.pl