Set a good foundation for attacking and defending this service by understanding how permissions work on AWS.
Explore security misconfiguration on commonly used AWS services including EC2, S3, VPC, KMS and more.
Work with Serverless components within AWS like Lambda functions, Step functions and more to understand how they can be exploited.
After understanding how the IAM service works, put this knowledge to practice by covering key concepts required to enumerate, exploit and persist across IAM.
If you are part of TryHackMe's business or education plan, please reach out to your dedicated customer success manager to get details about the pricing options available to access this content.
You will need to be on TryHackMe's business plan to purchase this course. If you're interested in joining hundreds of other companies upskilling their teams with TryHackMe, contact us using the form on the business page.
This content is only accessible for users on TryHackMe's business or education plans - however, there may be options to open this up to individuals in the future.