Task 1Introduction
Task includes a deployable machine
Task 2S3 Attacks and Defenses
Task 3EC2 Internet Exposure
Task 4Risks of Public Databases
Task 5Detecting Cloud Discovery
Task 6Denial of Wallet Attacks
Task 7Conclusion
Ready to learn Cyber Security?
The Monitoring AWS Services room is only available for premium users. Signup now to access more than 500 free rooms and learn cyber security through a fun, interactive learning environment.
Already have an account? Log in