Welcome to Cybr's official YouTube channel!
Your Go-To Resource for AWS Cloud Security Training π, Hands-on AWS Security Labs π οΈ, and AWS Security Tutorials.
Our in-depth tutorials, real-world scenario walkthroughs, and expert insights into AWS security best practices empower you to secure your cloud environments effectively. Join our community of over 70,000 learners π to master AWS cloud security together!
Subscribe now π and visit our website at cybr.com/ to access exclusive resources and stay updated with the latest in AWS security.
Cybr
Can you answer these questions about your infrastructure right now? π€
β Who changed your production database config last month?
β Do you have any configuration drift in your environment?
β Are there hardcoded secrets sitting in your IaC repos?
If you're hesitating on any of these... you've got security gaps that will probably fail your next audit (and that attackers might find and use to their advantage)
If you haven't seen it yet, just dropped a new video breaking down the 5 most common IaC security issues and exactly how to fix them π
https://youtu.be/SNR1TA0pELU
Any other issues you've seen with IaC? LMK in the comments
1 month ago | [YT] | 1
View 0 replies
Cybr
π§ͺ Pentesting AWS Lambda with CloudFox -> FREE new lab!
Leveraging the automated cloud-focused pentesting tool CloudFox, learn how to uncover Lambda security issues. Youβll identify exposed secrets and misconfigurations in serverless applications in order to find and capture a flag!
πΊοΈ Learning Objectives
π Use CloudFox to enumerate and assess Lambda functions
π Identify exposed environment variables and public access misconfigurations
π Analyze Lambda security configurations for vulnerabilities
π Generate actionable security findings
π Launch it for FREE now: cybr.com/hands-on-labs/lab/pentesting-aws-lambda-wβ¦
1 month ago | [YT] | 12
View 0 replies
Cybr
Introduction to AWS Lambda Enumeration πππ
In our FREE π§ͺ Hands-On Lab, step into the role of a security analyst tasked with auditing AWS Lambda functions in an environment with incomplete documentation and potential misconfigurations.
Using the AWS CLI, youβll enumerate all deployed Lambda functions, extract configuration details, analyze environment variables, and download function code to uncover common security issues such as hardcoded credentials, overly permissive IAM roles, and publicly accessible functions.
This lab is designed to teach you practical enumeration techniques used in real-world cloud security assessments and prepare you to spot risks that could lead to data exposure or privilege escalation.
All it requires is a free Cybr account. No payment or credit card required. Launch it now and capture the flag β³οΈ!
β‘οΈ cybr.com/hands-on-labs/lab/introduction-to-aws-lamβ¦
1 month ago | [YT] | 19
View 0 replies
Cybr
Learn how attackers exploit AWS Lambda functions with real-world attack vectors and techniques.
This course is entirely made up of 1-click deploy π§ͺ Hands-On Labs featuring vulnerable Lambda environments that will teach you how to identify and exploit serverless security weaknesses.
Each lab deploys real AWS environments where you'll practice Lambda enumeration, exploitation, and privilege escalation techniques.
The labs include CTF-style challenges that will test your skills by providing realistic scenarios for you to capture the flag.
Good luck and have fun! π«‘
Enroll in course β‘οΈ cybr.com/courses/aws-lambda-security-labs/
2 months ago | [YT] | 11
View 0 replies
Cybr
Regardless of whether youβre a large company, SMB, or running a personal AWS account, you should be using AWS Identity Center. Not IAM users.
βBut why? Why do you keep telling us we shouldn't be using IAM users anymore? What's the deal with Identity Center, and why should I use it when Iβm not some large enterprise?β
I still get a lot of questions like this about IAM Identity Center, and I don't blame you if you find it confusing. Frankly, AWS has made it seem a lot more complicated than they needed to. They use enterprise-y language to promote it, but the reality is that just about everyone should be using it, even down to personal accounts.
I outline exactly why in this brand new cheat sheet, including how to get started with using it.
We also have a free tutorial that guides you step-by-step on how to set it up both in the AWS Console and how to use it with the AWS CLI. Access it here for FREE -> cybr.com/courses/aws-certified-security-specialty-β¦ (you just need to be logged in to access)
2 months ago | [YT] | 13
View 0 replies
Cybr
What is a key limitation of AWS Audit Manager that organizations should understand?
3 months ago | [YT] | 3
View 0 replies
Cybr
In an EventBridge rule for AWS Config events, what does the following event pattern filter accomplish?
{
"source": ["aws.config"],
"detail-type": ["Config Configuration Item Change"],
"detail": {
"messageType": ["ConfigurationItemChangeNotification"],
"configurationItem": {
"resourceType": ["AWS::S3::Bucket"]
},
"configurationItemDiff": {
"changeType": ["UPDATE"]
}
}
}
3 months ago | [YT] | 6
View 0 replies
Cybr
An organization wants to centrally manage AWS WAF rules across all accounts in their organization. Which service combination would be most appropriate?
3 months ago | [YT] | 4
View 0 replies
Cybr
An organization wants to deploy the same security baseline (AWS Config rules, CloudTrail, GuardDuty) across all accounts in multiple OUs within their organization. Which CloudFormation feature would be most appropriate?
3 months ago | [YT] | 2
View 0 replies
Cybr
You asked for it, and it's here: Cybr now offers multi-cloud security training! Introducing our first Azure course ππ₯³
βπ‘οΈ Getting Started with Microsoft Defender for Cloudβ
Learn how to use Microsoft Defender for Cloud, a cloud-native application protection platform (CNAPP) that provides security posture management and workload protection for Azure, AWS, GCP, and on-premises environments. You'll learn to configure security policies, implement compliance frameworks like NIST 800-53, protect various workloads including VMs, containers, and storage accounts, and automate incident response using Logic Apps and workflow automation.
Enroll today: cybr.com/courses/getting-started-with-microsoft-deβ¦
3 months ago | [YT] | 3
View 0 replies
Load more