How AWS Certification Boosts Your Cloud Security Skills
Level up your Cloud security skills on AWS. See what’s on the Security Specialty, why it matters, and how to pass with hands-on practice.
Cybrary’s structured, hands-on cybersecurity training empowers professionals to better protect their organizations. Through curated Skill and Career Paths, threat-informed courses, and industry-aligned Certification Preparation, we offer the best in the business.
Trusted by leading organizations worldwide
Start your cyber journey with guided Career Paths that teach the foundational concepts related to real, on-the-job responsibilities.
Our scalable, repeatable onboarding programs ensure every new employee has the same foundation of knowledge and skills.
Ace the exam with Certification Prep Paths developed by industry-leading instructors. Gain insider tips and build confidence with our practice exams.
Master hands-on skills and familiarize yourself with the latest vulnerabilities and threats so you can prepare for real-world attacks.
Create new opportunities for your most committed personnel and watch your retention rates soar.
Use real-time data to discover how closely correlated employee cybersecurity training is to risk reduction and costs savings.
Upskill your team with Cybrary’s suite of learning activities and management tools, including hands-on Virtual Labs, role-aligned Career Paths, and personalized remediation. Request a demo and learn how Cybrary tailors our deep library of training to your team’s unique needs.
In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.
CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Our OSINT certification course and training for open source intelligence (OSINT), the process of collecting and analyzing publicly available information that can be exploited by adversaries. Learn techniques for gathering intelligence from public data sources and how to leverage this knowledge to defend your organization from those who wish to do harm.
Our Kali Linux certification course and training is designed for those interested in penetration testing and ethical hacking. Kali Linux course is a great place to start your Kali Linux training to learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Cybrary's accessible, affordable cybersecurity courses & training platform provides curated career paths, threat-informed training, and certification preparation for professionals at all levels.Start Learning for Free
Upskill your team with Cybrary's suite of learning activities and management tools, including hands-on practice labs, assessments, and custom guided pathways. Request a demo and learn how Cybrary tailors our deep library of trainings to your team's unique needs.
This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to for data exfiltration, espionage, and even further exploitation.
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.
CVE-2024-23334 is a high severity vulnerability found in the aiohttp Python library, a popular asynchronous HTTP client/server framework. By the end of this course you will be able to execute a directory traversal attack using aiohttp's vulnerable configuration and then perform remediation steps to fix the vulnerability.
CVE-2024-27348 is a critical vulnerability in Apache HugeGraph, a graph database designed for large-scale data management. With a CVSS score of 9.8, attackers can exploit this flaw by sending crafted payloads to execute arbitrary commands, potentially leading to a full system compromise.
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
The ISACA Certified Information Security Manager (CISM) practice test from CyberVista helps students to prepare for the ISACA CISM certification. In the practice test, learners demonstrate their advanced knowledge and ability to manage, design, monitor, and assess information security. This practice exam is aligned to CISM 16th edition.
Get ready for the CFR 410 Certification! This practice exam measures your ability as a first responder to defend against and respond to cyber-attacks. It evaluates your knowledge of threat analysis, secure computing and network environment designs, vulnerability assessments, and incident response.
The CompTIA CAS-005 SecurityX practice test from CyberVista challenges you to demonstrate a deep understanding of enterprise information security concepts. This includes: Risk Management, Enterprise Security Architecture, Enterprise Security Operations, and Research, Development, and Collaboration. (This exam was formerly known as CASP+)
Prepare for the AWS Certified Solutions Architect Associate exam (SAA-C03), which is for those in a solutions architect role and experience designing available, efficient, fault-tolerant, and scalable systems on AWS. The exam measures your ability to: architect and deploy applications, define solutions, and provide implementation guidance.
Gain hands-on experience creating a launch template for an Amazon Elastic Cloud Compute (Amazon EC2) instance. Lab activities include: configuring a key pair and a security group, creating a launch template based on an Amazon Machine Image (AMI), launching an EC2 instance, and establishing an SSH terminal connection to the instance using PuTTy.
Gain hands-on experience configuring storage by using Amazon Elastic Block Store (EBS) to create a volume that you can attach to an Amazon Elastic Compute Cloud (EC2) instance. Lab activities include: creating an EBS volume, modifying the EBS volume, and attaching the EBS volume to an EC2 instance.
Gain hands-on experience configuring AWS data transfer and storage options. Lab activities inlcude: creating a new Amazon Simple Storage Service (S3) bucket, enabling transfer acceleration, classifying stored files, and configuring file storage to use the most cost-effective storage tiers.
In this lab, you will establish a location for the exchange of files with external customers. You will create a new S3 bucket that uses version control; create a new S3 bucket for data; enable logging, version control, and file encryption; upload a file and modify the file permissions; and verify access and version control.
The AWS Certified Cloud Practitioner practice test helps students prepare for the AWS Certified Cloud Practitioner certification examination. This exam verifies the student's knowledge in the shared responsibility model and fundamental AWS services, like Shield, IAM, S3, EC2, and AWS billing.
Gain hands-on experience monitoring applications by using an Amazon CloudWatch dashboard. Lab activities include: connecting to the web servers that are running behind a load balancer, creating a CloudWatch metric filter for errors on each web server, and creating a custom CloudWatch dashboard to display the memory, CPU, and load balancer metrics.
Gain hands-on experience creating a scalable website. Lab activities include: creating security groups for a load balancer and an Auto Scaling group, creating a launch template that you will use to create Amazon EC2 instances, attaching a new load balancer to a Auto Scaling group, and connecting to the website through the load balancer.
Create an Amazon DynamoDB table that will be used to access data for a Python application. Lab activities include: creating an IAM policy to allow access to a DynamoDB table, installing the Boto3 and pandas Python libraries in the AppServer instance, and connecting to an Amazon EC2 instance to test access to the table from the Python application.
Gain hands-on experience creating a Windows Server virtual machine by using Amazon Elastic Compute Cloud (EC2). Lab activities include: creating a new key pair to decrypt the password for an EC2 instance, creating a security group to allow access, and creating and connecting to an EC2 instance using an Amazon Machine Image (AMI) and RDP.
Prepare for the AWS Certified Security Specialist (SCS-C02) exam. Amazon recommends candidates have at least 5 years of IT security experience in designing and implementing security solutions, and hands-on experience securing AWS workloads. The exam covers: Incident Response, Logging & Monitoring, Infrastructure Security, IAM, and Data Protection.
Gain hands-on experience implementing a security monitoring process with AWS CloudTrail. Lab activities include: setting up CloudTrail to track management events, configuring a topic by using Amazon SNS, configuring Amazon CloudWatch Logs by using a metric filter, configuring an alarm for a log group, and reviewing the CloudTrail trail.
In this lab, you will learn how to protect sensitive information in an AWS environment. First, you will create an Amazon EC2 key pair to provide a secure connection to an instance. Then add and upload the key to the AWS Systems Manager Parameter Store. Finally, you will store a set of access key credentials in the AWS Secrets Manager.
Gain hands-on experience creating an Identity and Access Management (IAM) role to access an Amazon Simple Storage Service (Amazon S3) bucket from an Elastic Compute Cloud (EC2) instance. Activities include: creating an Amazon S3 bucket, creating an IAM policy that provides full control of the bucket, and testing the policy in a new EC2 instance.
Gain hands-on experience creating an Identity and Access Management (IAM) user that has full administrator access. Lab activities include: creating an IAM user, creating a user group, assigning a user to the group, attaching a policy to the group, and implementing multi-factor authentication for the root account.
Gain hands-on experience creating an AWS Identity and Access Management (IAM) policy to manage an Amazon S3 bucket. Lab activities include: creating an IAM policy and user group, adding a user account to the group, creating an S3 bucket, adding an object to the bucket, and attempting to delete both the object and the bucket.
In this AWS CSS: Management and Security Governance course, you will learn about AWS Organizations, designing secure and consistent deployment strategies for cloud resources, and how to identify security gaps through architectureal reviews and cost analysis in AWS.
The CompTIA PenTest+ certification exam is for cybersecurity professionals tasked with penetration testing and vulnerability management. Testers will be required to demonstrate hands-on skills and knowledge to test devices in environments such as the cloud and mobile, in addition to traditional desktops and servers.
The Microsoft Azure Fundamentals practice test by CyberVista helps you prepare for and pass the Microsoft AZ-900 exam, which requires learners to demonstrate foundational level knowledge of Azure cloud services and how those services are provided. AZ-900 is for non-technical users, or those who have some involvement with cloud based solutions.
Explore our on-demand cybersecurity courses & training developed by seasoned certified cybersecurity practitioners, aligned to the certification exam’s key learning objectives.