AWS Gone Wild - How Attackers Exploit Your Cloud and How to Outsmart Them
The Fastest Way to Become a Backend Developer Online
Build AI Apps with Azure, Copilot, and Generative AI — Microsoft Certified
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into a comprehensive 42-minute conference talk that dissects a real-world multi-stage AWS attack scenario, revealing how cybercriminals exploit cloud vulnerabilities and demonstrating effective countermeasures. Examine the complete attack chain from initial compromise through exposed IAM credentials, lateral movement techniques using EC2 instances, privilege escalation methods involving federated session tokens, and the establishment of persistent access through Lambda functions. Master advanced threat detection methodologies and learn proven remediation strategies essential for securing cloud infrastructure against sophisticated adversaries. Gain practical insights into AWS security best practices, incident response procedures, and defensive techniques specifically designed to protect against evolving cloud-based threats, making this session invaluable for cloud engineers, security professionals, and incident responders seeking to fortify their AWS environments.
Syllabus
AWS Gone Wild: How Attackers Exploit Your Cloud and How to Outsmart Them
Taught by
RSA Conference