To access material, start machines and answer questions login.
With over 200 -managed services, it is hard to know every possible attack vector, and even harder to defend against all of them. Fortunately, roughly 80% of attacks on services can be detected with just 20% of effort. This room focuses on the most common and impactful attacks targeting services, and explores how to detect them using and other cloud logs.
Learning Objectives
- Learn the risks of exposed and RDS, and practice the defenses
- Understand the workflows to detect insecure security groups
- Learn about the emerging Denial of Wallet attacks targeting
- Practice the material in via and datasets
Prerequisites
- Security Logging
- : The Basics
- Preferably, Introduction to module
- Preferably, Level 1 Analyst path
Lab Access
Start the lab by clicking the Start Machine button below. You will then have access to the Web Interface. Please wait 4-5 minutes for the instance to launch. To access , follow this link:
Set up your virtual environment
Let's begin!
Ready to learn Cyber Security?
The Monitoring AWS Services room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in