back to top

UC – AWS Security

AWS secures the physical data centers and hypervisors, but customers own the identity, configuration, encryption, and monitoring layers. Mastering this sharedโ€‘responsibility model means designing least privilege on day one, isolating workloads by account, and wiring continuous detection so every drift or rogue API call is caught, before it becomes tomorrowโ€™s headline. Bottom line… most of AWS Security is up to YOU!

The goal for this Free Upskill Challenge by Carlos Polop of HackTricks is to:

  • Inspire you to learn even more far beyond the 20 – 30 minutes of this UC.
  • Give you an introduction to the basics and best-practices for securing your AWS environment.
  • Show you some actions you can take immediately to reduce your attack surface.

Price = FREE!

Whatโ€™s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as โ€œfriendsโ€ of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 โ€“ 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for “UC – AWS Security”

UCs assume no knowledge at all! Theyโ€™re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Announcements

๐ŸŽ… Cyber Monday December ๐ŸŽ…

Code "CYBER25" = 25% Off ALL Courses until Mid ET Dec 31! Excludes Bundles & NameYourPrice items.

New Releases

- Windows Log Analysis - SIEMless Threat Hunting Learn threat hunting basics using only Win & open source tools. Just $45 w/ labs!
- 2 New Bundles - 50% OFF 7 CTF Bundle, 75% Off 7 Hack-Along Bundle
- Blog - Blue Team Training Roadmap

Top Picks

- ConDef 2025 Only $375 w/ Code CYBER25!
- The Mishaal Bundle
- Phishing โ€“ A Technical Course for Red Teaming

Courses In Production

WMD 5, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...

Additional content in this category: