Cybr Courses Courses Search All Courses14 AlphabeticalNewly Created All CategoriesAdvancedApplication SecurityBeginnerCertificationsCloud SecurityCybersecurity FundamentalsDevSecOpsEthical HackingIntermediateNetworking Security All InstructorsAldenAyushChadChristopheJuanTyler Petty Not Enrolled 45 Lessons AWS Certified Security Specialty – Premium Edition Christophe Ready to go beyond just passing the exam? While our free AWS Certified Security Specialty course gives you everything needed to pass the certification, this Premium Edition is designed for professionals who want to learn AWS security in practice, not just theory. What makes Premium different? Hands-On Labs: Practice with real AWS environments using the same tools you'll use on the job Scenarios: Tackle security challenges based on real-world situations Knowledge-Check Quizzes: Validate your understanding and identify knowledge gaps before the exam Already enrolled in the free course? Perfect! This premium content is an add-on to that course - no need to start over or duplicate efforts. New to Cybr? Start with the free course to get a feel for our teaching approach. This course is under active development with new content regularly released for the SCS-C03 version of the exam. Free 196 Lessons AWS Certified Security Specialty Course Christophe Let's get AWS Security Specialty Certified! Video lessons are accessible to all for free, and Hands-On Labs, Quizzes, and Practice Exams will be available to Cybr Premium Members. This course is in active development for the SCS-C03 and new content is made available weekly. Since this is a large course, it will take a while to finish and we do not currently have an end date. In the meantime, check out our free study groups. Free 0 Lessons AWS Certified Security Specialty Practice Exams Christophe Let's get AWS Security Specialty Certified! Apart from the sample version, Practice Exams will be available to Cybr Premium Members. These practice exams are in active development and new content is added regularly. We do not currently have an end date. Join us for free live study groups where we walk through sample practice exam questions and scenarios! Free 36 Lessons AWS IAM Privilege Escalation Labs Christophe Learn first-hand how attackers exploit IAM misconfigurations in AWS with tactics pulled from real case studies. This course is entirely made up of 🧪 Hands-On Labs with different scenarios that will teach you how to exploit some of the most dangerous IAM privilege escalation weaknesses. The final section is made up of Challenges that will test your new skills and knowledge by providing vulnerable environments for you to capture the flag with limited information and hints. Good luck and have fun! Free 20 Lessons Beginner’s Guide to AWS CloudTrail for Security Christophe Get started with AWS CloudTrail: one of the most important security services that AWS offers. While the CloudTrail service is enabled by default when you create an AWS account, it's enabled with limited functionality that can leave you blind and can hinder your ability to investigate security incidents. For example, there's a very big difference between Management Events, Data Events, and Insights Events, and only one of those is enabled by default. This course will teach you those differences and the 3 main ways that CloudTrail records data so that you can make an informed decision about what you or your organization needs. After covering important concepts, we'll jump in hands-on and learn how to use CloudTrail's Event History, how to create your first trail, how to enable notifications with CloudWatch and SNS, how to use CloudTrail Insights, and how to work with CloudTrail Lake. Finally, you will learn how to secure your CloudTrail trails and log files with best practices using IAM, log file integrity, encryption, and the Security Hub Controls checklist. Whenever someone wants to get started with AWS security, coupled with our Introduction to AWS Security course, we highly recommend starting with this course and understanding CloudTrail. This service gives you visibility into your AWS environments, and without visibility, you do not have security. Not Enrolled 43 Lessons Container Security with Kubernetes & GitLab CI/CD Chad In this hands-on course, learn how to use Kubernetes with GitLab CI/CD, and learn key concepts of container security. You will learn about: How to install GitLab server and Kubernetes on AWS EC2 Container security concepts Kubernetes fundamentals GitLab & Kubernetes security concepts Securing container images Securing Kubernetes Microservices Monitoring and logging for container security Compliance and governance Supply chain security (SCS) and more Please note: All video lessons and text lessons/notes have been added, but not all 1-click deploy hands-on labs are available yet. You can still complete this course in its entirety if you plan on using your own environment. Not Enrolled 17 Lessons Getting Started with Microsoft Defender for Cloud Chad This course covers Microsoft Defender for Cloud, a cloud-native application protection platform (CNAPP) that provides security posture management and workload protection for Azure, AWS, GCP, and on-premises environments. You'll learn to configure security policies, implement compliance frameworks like NIST 800-53, protect various workloads including VMs, containers, and storage accounts, and automate incident response using Logic Apps and workflow automation. Not Enrolled 50 Lessons Incident Response with CloudTrail and Athena Christophe Learn how to effectively respond to incidents in your AWS accounts regardless of whether you are running a single or multi-account setup using CloudTrail Lake and Athena — two native AWS services. This Incident Response (IR) course simulates attacks against your AWS environments that have been seen in the real-world. After simulating attacks, you’ll put on your security analyst hat to respond to the incident. You will then learn how to follow IR playbooks from AWS and eventually even create your own by following NIST’s 4 phases: Preparation Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity You’ll learn how to gather information to understand what’s going on and what resources are involved, and how to properly contain the affected resources. You will then take steps to eradicate the threat, recover (and harden) your configurations, and put together a report that you can turn into an updated playbook specific to your environments and use cases. The attack scenarios and end-to-end projects include: IAM credentials exposure to S3 backdoor and data exfiltration IAM credentials exposure to EC2 cryptomining The final section of the course then shows you how to take what you’ve learned and apply it to multi-account setups with centralized CloudTrail logging in a Log Archive account, and centralized IR querying with CloudTrail Lake in a Security Tooling account. Free 8 Lessons Introduction to AWS Enumeration Christophe Learn the basics of AWS enumeration in this Hands-On Labs course. Enumeration is the process of identifying and cataloguing AWS resources and services in an environment. The purpose is to gain a comprehensive understanding of the AWS environment, which is a critical step in assessing its security posture. Enumeration is used by both ethical hackers and black hats, because it's one of the first steps in identifying potential vulnerabilities that can be exploited. It's a crucial process for effective cloud security management, because it will allow you to identify misconfigurations or other potential attack vectors that need to be addressed. This course will show you hands-on how to perform enumeration in AWS by walking through the basics and enumerating several very important AWS services that are often targeted by attackers. Not Enrolled 101 Lessons Introduction to AWS Security Christophe Learn how to secure your cloud infrastructure with one of our best-selling courses: Introduction to AWS Security. Designed for AWS security beginners (but not complete beginners to AWS), this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats. Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing S3), network and infrastructure security, and monitoring & logging. Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab 🧪 exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console. Upon completion, you'll be awarded a certificate of completion. This certificate can be added to LinkedIn and can serve as a valuable asset when showcasing your skills to potential employers or clients. Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively! Not Enrolled 43 Lessons Pentesting AWS Environments with Pacu, CloudGoat, and ChatGPT Christophe Learn hands-on how to exploit AWS cloud misconfigurations and build practical skills with step-by-step walkthroughs, labs, and CTFs. This course uses and teaches 4 primary tools: CloudGoat Pacu ChatGPT AWS CLI CloudGoat enables you to deploy vulnerable-by-design AWS scenarios in your own environments, although we will be providing a couple of those scenarios as 1-click deploy 🧪 Cybr Hands-On Labs if you would rather not use your own environments. Not all of the scenarios will be available with our labs due to how vulnerable they are. In addition to using the AWS command line interface (CLI), we’ll be using a cloud penetration testing tool called Pacu. We will also be using ChatGPT by having it craft payloads, troubleshoot for us, and overall help us speed up and be more effective. This course is primarily for individuals who want to perform security assessments of AWS environments and resources, or who want to learn what to do once they’ve gained access to a set of limited AWS credentials. There are a couple of scenarios that show how to gain initial access to credentials through misconfigurations, but this course is mostly focused on helping you find privilege escalation paths. Not Enrolled 18 Lessons Practical Guide to AWS IAM Roles Christophe Learn how to use IAM Roles like the pros. This course answers questions like: What are IAM roles and how are they different from users? When should you use roles, and how? What are differences between trust policies, managed policies, and inline policies? What's an effective way to assume roles? How does role chaining work? How does cross-account access work? What is IAM Roles Anywhere and how does it work? What are service-linked roles, and how are they different from service roles? What are security implications of using roles? You'll also learn some helpful tips, tricks, and useful tools to make using roles easier and more effective. We start off with a few conceptual lessons to cover key concepts, and then we dive into practical hands-on learning. Not Enrolled 22 Lessons Securing Amazon S3 Data Ayush Learn what Amazon S3 is, how it works, and how to protect your data. This course will show you how to create and configure buckets, upload and access objects, avoid common security misconfigurations (some of which have resulted in massive breaches), and how to run regular automated scans with open source tools to discover issues. You'll also learn to think like an attacker to find weaknesses that could potentially be exploited. The course was designed to provide a heavy dose of hands-on, practical learning with a mixture of taking action through the console, CLI, and roles. Not Enrolled 33 Lessons Terraform on AWS: From Zero to Cloud Infrastructure Tyler Petty In this hands-on course, you’ll learn how to use Terraform to securely deploy resources on AWS using Infrastructure as Code (IaC). Guided by instructors with experience running Terraform in production, we’ll take you step-by-step from zero prior Terraform knowledge to confidently writing infrastructure as code and deploying production-ready AWS resources securely. Not Enrolled 45 Lessons AWS Certified Security Specialty – Premium Edition Christophe Ready to go beyond just passing the exam? While our free AWS Certified Security Specialty course gives you everything needed to pass the certification, this Premium Edition is designed for professionals who want to learn AWS security in practice, not just theory. What makes Premium different? Hands-On Labs: Practice with real AWS environments using the same tools you'll use on the job Scenarios: Tackle security challenges based on real-world situations Knowledge-Check Quizzes: Validate your understanding and identify knowledge gaps before the exam Already enrolled in the free course? Perfect! This premium content is an add-on to that course - no need to start over or duplicate efforts. New to Cybr? Start with the free course to get a feel for our teaching approach. This course is under active development with new content regularly released for the SCS-C03 version of the exam. Free 196 Lessons AWS Certified Security Specialty Course Christophe Let's get AWS Security Specialty Certified! Video lessons are accessible to all for free, and Hands-On Labs, Quizzes, and Practice Exams will be available to Cybr Premium Members. This course is in active development for the SCS-C03 and new content is made available weekly. Since this is a large course, it will take a while to finish and we do not currently have an end date. In the meantime, check out our free study groups. Free 0 Lessons AWS Certified Security Specialty Practice Exams Christophe Let's get AWS Security Specialty Certified! Apart from the sample version, Practice Exams will be available to Cybr Premium Members. These practice exams are in active development and new content is added regularly. We do not currently have an end date. Join us for free live study groups where we walk through sample practice exam questions and scenarios! Free 36 Lessons AWS IAM Privilege Escalation Labs Christophe Learn first-hand how attackers exploit IAM misconfigurations in AWS with tactics pulled from real case studies. This course is entirely made up of 🧪 Hands-On Labs with different scenarios that will teach you how to exploit some of the most dangerous IAM privilege escalation weaknesses. The final section is made up of Challenges that will test your new skills and knowledge by providing vulnerable environments for you to capture the flag with limited information and hints. Good luck and have fun! Free 20 Lessons Beginner’s Guide to AWS CloudTrail for Security Christophe Get started with AWS CloudTrail: one of the most important security services that AWS offers. While the CloudTrail service is enabled by default when you create an AWS account, it's enabled with limited functionality that can leave you blind and can hinder your ability to investigate security incidents. For example, there's a very big difference between Management Events, Data Events, and Insights Events, and only one of those is enabled by default. This course will teach you those differences and the 3 main ways that CloudTrail records data so that you can make an informed decision about what you or your organization needs. After covering important concepts, we'll jump in hands-on and learn how to use CloudTrail's Event History, how to create your first trail, how to enable notifications with CloudWatch and SNS, how to use CloudTrail Insights, and how to work with CloudTrail Lake. Finally, you will learn how to secure your CloudTrail trails and log files with best practices using IAM, log file integrity, encryption, and the Security Hub Controls checklist. Whenever someone wants to get started with AWS security, coupled with our Introduction to AWS Security course, we highly recommend starting with this course and understanding CloudTrail. This service gives you visibility into your AWS environments, and without visibility, you do not have security. Not Enrolled 43 Lessons Container Security with Kubernetes & GitLab CI/CD Chad In this hands-on course, learn how to use Kubernetes with GitLab CI/CD, and learn key concepts of container security. You will learn about: How to install GitLab server and Kubernetes on AWS EC2 Container security concepts Kubernetes fundamentals GitLab & Kubernetes security concepts Securing container images Securing Kubernetes Microservices Monitoring and logging for container security Compliance and governance Supply chain security (SCS) and more Please note: All video lessons and text lessons/notes have been added, but not all 1-click deploy hands-on labs are available yet. You can still complete this course in its entirety if you plan on using your own environment. Not Enrolled 17 Lessons Getting Started with Microsoft Defender for Cloud Chad This course covers Microsoft Defender for Cloud, a cloud-native application protection platform (CNAPP) that provides security posture management and workload protection for Azure, AWS, GCP, and on-premises environments. You'll learn to configure security policies, implement compliance frameworks like NIST 800-53, protect various workloads including VMs, containers, and storage accounts, and automate incident response using Logic Apps and workflow automation. Not Enrolled 50 Lessons Incident Response with CloudTrail and Athena Christophe Learn how to effectively respond to incidents in your AWS accounts regardless of whether you are running a single or multi-account setup using CloudTrail Lake and Athena — two native AWS services. This Incident Response (IR) course simulates attacks against your AWS environments that have been seen in the real-world. After simulating attacks, you’ll put on your security analyst hat to respond to the incident. You will then learn how to follow IR playbooks from AWS and eventually even create your own by following NIST’s 4 phases: Preparation Detection and Analysis Containment, Eradication, and Recovery Post-Incident Activity You’ll learn how to gather information to understand what’s going on and what resources are involved, and how to properly contain the affected resources. You will then take steps to eradicate the threat, recover (and harden) your configurations, and put together a report that you can turn into an updated playbook specific to your environments and use cases. The attack scenarios and end-to-end projects include: IAM credentials exposure to S3 backdoor and data exfiltration IAM credentials exposure to EC2 cryptomining The final section of the course then shows you how to take what you’ve learned and apply it to multi-account setups with centralized CloudTrail logging in a Log Archive account, and centralized IR querying with CloudTrail Lake in a Security Tooling account. Free 8 Lessons Introduction to AWS Enumeration Christophe Learn the basics of AWS enumeration in this Hands-On Labs course. Enumeration is the process of identifying and cataloguing AWS resources and services in an environment. The purpose is to gain a comprehensive understanding of the AWS environment, which is a critical step in assessing its security posture. Enumeration is used by both ethical hackers and black hats, because it's one of the first steps in identifying potential vulnerabilities that can be exploited. It's a crucial process for effective cloud security management, because it will allow you to identify misconfigurations or other potential attack vectors that need to be addressed. This course will show you hands-on how to perform enumeration in AWS by walking through the basics and enumerating several very important AWS services that are often targeted by attackers. Not Enrolled 101 Lessons Introduction to AWS Security Christophe Learn how to secure your cloud infrastructure with one of our best-selling courses: Introduction to AWS Security. Designed for AWS security beginners (but not complete beginners to AWS), this training course provides you with the essential knowledge and skills to protect your AWS environments and resources from all sorts of threats. Led by industry experts with extensive experience in AWS security, this course offers a deep dive into the fundamental concepts and best practices for securing cloud infrastructure in Amazon Web Services. You'll gain a solid understanding of Identity and Access Management (IAM), data access control and encryption (including securing S3), network and infrastructure security, and monitoring & logging. Our interactive learning approach combines comprehensive lessons, interactive diagrams, and hands-on lab 🧪 exercises as well as challenges to help you both grasp security concepts and know how to apply them in real-world scenarios. You'll have the opportunity to reinforce your learning and gain hands-on experience configuring security measures directly in the AWS Management Console. Upon completion, you'll be awarded a certificate of completion. This certificate can be added to LinkedIn and can serve as a valuable asset when showcasing your skills to potential employers or clients. Enroll in our Introduction to AWS Security course today and gain the knowledge and confidence to start protecting your AWS environment effectively! Not Enrolled 43 Lessons Pentesting AWS Environments with Pacu, CloudGoat, and ChatGPT Christophe Learn hands-on how to exploit AWS cloud misconfigurations and build practical skills with step-by-step walkthroughs, labs, and CTFs. This course uses and teaches 4 primary tools: CloudGoat Pacu ChatGPT AWS CLI CloudGoat enables you to deploy vulnerable-by-design AWS scenarios in your own environments, although we will be providing a couple of those scenarios as 1-click deploy 🧪 Cybr Hands-On Labs if you would rather not use your own environments. Not all of the scenarios will be available with our labs due to how vulnerable they are. In addition to using the AWS command line interface (CLI), we’ll be using a cloud penetration testing tool called Pacu. We will also be using ChatGPT by having it craft payloads, troubleshoot for us, and overall help us speed up and be more effective. This course is primarily for individuals who want to perform security assessments of AWS environments and resources, or who want to learn what to do once they’ve gained access to a set of limited AWS credentials. There are a couple of scenarios that show how to gain initial access to credentials through misconfigurations, but this course is mostly focused on helping you find privilege escalation paths. Not Enrolled 18 Lessons Practical Guide to AWS IAM Roles Christophe Learn how to use IAM Roles like the pros. This course answers questions like: What are IAM roles and how are they different from users? When should you use roles, and how? What are differences between trust policies, managed policies, and inline policies? What's an effective way to assume roles? How does role chaining work? How does cross-account access work? What is IAM Roles Anywhere and how does it work? What are service-linked roles, and how are they different from service roles? What are security implications of using roles? You'll also learn some helpful tips, tricks, and useful tools to make using roles easier and more effective. We start off with a few conceptual lessons to cover key concepts, and then we dive into practical hands-on learning. Not Enrolled 22 Lessons Securing Amazon S3 Data Ayush Learn what Amazon S3 is, how it works, and how to protect your data. This course will show you how to create and configure buckets, upload and access objects, avoid common security misconfigurations (some of which have resulted in massive breaches), and how to run regular automated scans with open source tools to discover issues. You'll also learn to think like an attacker to find weaknesses that could potentially be exploited. The course was designed to provide a heavy dose of hands-on, practical learning with a mixture of taking action through the console, CLI, and roles. Not Enrolled 33 Lessons Terraform on AWS: From Zero to Cloud Infrastructure Tyler Petty In this hands-on course, you’ll learn how to use Terraform to securely deploy resources on AWS using Infrastructure as Code (IaC). Guided by instructors with experience running Terraform in production, we’ll take you step-by-step from zero prior Terraform knowledge to confidently writing infrastructure as code and deploying production-ready AWS resources securely. Hands-On Labs View list of labs > Get notified when we publish new courses Subscribe