Applied AWS Security
Applied AWS Security
Instructor: int eighty (of Dual Core)
Interested in AWS hacking, but don’t know where to start? Applied AWS Security is a hands-on experience through the premier AWS services focusing on offense, defense, and engineering. This class, taught by world-renowned hacker int eighty of Dual Core (Hack All The Things!), guides you from the foundations of cloud security through advanced techniques for operating in AWS environments.
Applied AWS Security is a comprehensive training that includes initial access vectors, privilege escalation, evading detection, database exfiltration, persistence with serverless, and targeting object (file) storage. Students will apply course material in each module, working with services and resources, in an AWS environment curated by the instructor. No prior cloud security experience is required; and even those well-versed in AWS will almost certainly pick up some new techniques.
The course is a mix of lecture, discussion, exercises, and labs. To distinguish between the latter two:
- Exercises: Guided, hands-on experiences. Students perform tasks along with the instructor step by step.
- Labs: Solving challenges by finding the missing puzzle piece. Students apply information from the module to accomplish the objective.
Through relevant hands-on exercises and int eighty’s engaging teaching style, you will gain the capabilities to bypass, protect, and scale security in AWS. Upon completion, you will have the understanding to apply your skills against other AWS services, and even other cloud providers.
Who Should Take This Course
Applied AWS Security is geared toward security, platform engineering, and DevOps professionals who want to grow their AWS expertise. From core concepts through advanced techniques, the class features something for everyone. Some AWS and command-line experience is helpful, but not required. Come learn to bypass, protect, and scale security in AWS.
- Platform Engineers, DevOps, and DevSecOps folks
- Security Engineers working with AWS
- Penetration Testers and Red Teamers targeting AWS environments
- Blue Teamers, Incident Responders, and Detection Engineers protecting infrastructure in AWS
We can issue certificates for Continuing Education credits (CEU, CPE, et al).
What to Bring
Students must provide their own computer that runs a web browser and the AWS CLI . Even a Chromebook that runs Linux should be sufficient. Almost all of the resources are in the cloud – aka someone else’s computer.
Please bring your preferred note-taking implement as the course guide may provide inadequate space for documenting notes.
About the Instructor
int eighty is a computer crime enthusiast and information security professional with 15 years of industry experience. He has worked for multiple FAANG/MANGA companies to protect the everyday internet user. Additionally, he has presented at numerous industry conferences including DEF CON and a variety of BSides events. He now works to advise and assist clients in their cloud security initiatives.