
Expert-Level Instruction
This course is taught by Tyler Ramsbey. Tyler is a well-known penetration tester. He has multiple CVEs and helps maintain industry-standard tools such as Pacu and CloudGoat.
--
In today's cloud-first world, AWS security expertise isn't just nice to have—it's essential. Our comprehensive penetration testing course bridges theory and practice, equipping you with in-demand skills to:
- Identify and exploit AWS configuration vulnerabilities
- Implement professional-grade security measures
- Add a powerful credential to your resume
- Increase your market value in cybersecurity
Whether you're starting from scratch or enhancing existing skills, our structured approach ensures you'll master AWS penetration testing techniques that apply to real-world scenarios.
Example Curriculum
- 3.1 IAM for Pentesters (12:52)
- 3.2 IAM Enumeration Cheat Sheet
- 3.3 Lab Introduction and Set Up (3:02)
- 3.4 User and Policy Enumeration (10:43)
- 3.5 Group and Role Enumeration (11:57)
- 3.6 [Challenge Lab] Use Pacu to Automate Enumeration
- 3.7 [Walkthrough] Use Pacu to Automate Enumeration (10:44)
- 3.8 IAM Section Quiz
- 5.1 Lambda for Pentesters (8:14)
- 5.2 Lambda Enumeration Cheat Sheet
- 5.3 Lab Introduction and Set Up (4:38)
- 5.4 Lambda Enumeration (Console) (9:07)
- 5.5 Lambda Enumeration (CLI / Pacu) (9:58)
- 5.6 [Challenge Lab] Enumerate Permissions of Leaked Credentials
- 5.7 [Walkthrough] Enumerate Permissions of Leaked Credentials (8:19)
- 5.8 (Optional) Destroy the Cloudgoat Scenario
- 5.9 Lambda Section Quiz
- 6.1 EC2s for Pentesters (7:44)
- 6.2 EC2 Enumeration Cheat Sheet
- 6.3 Lab Introduction and Set Up (3:03)
- 6.4 EC2 Enumeration (Console) (9:00)
- 6.5 EC2 Enumeration (CLI / Pacu) (11:11)
- 6.6 [Challenge Lab] Abuse SSRF and Access the S3 Bucket
- 6.7 [Walkthrough] Identifying and Abusing the SSRF Vulnerability (9:47)
- 6.8 [Walkthrough] Discovering Credentials and Invoking the Lambda Function (8:29)
- 6.9 Destroy the Cloudgoat Scenario
- 6.10 EC2 Section Quiz
- 7.1 Overview of Privilege Escalation in AWS (11:42)
- 7.2 Privilege Escalation Cheat Sheet
- 7.3 Lab Introduction and Set Up (3:40)
- 7.4 [Challenge Lab] Enumerating Policies and Permissions
- 7.5 [Walkthrough] Enumerating Policies and Permissions (7:44)
- 7.6 [Challenge Lab] Hunting for Roles and Role Permissions
- 7.7 [Walkthrough] Hunting for Roles and Role Permissions (9:46)
- 7.8 [Challenge Lab] Assuming the Target Role and Privilege Escalation
- 7.9 [Walkthrough] Assuming the Target Role and Privilege Escalation (12:04)
- 7.10 Destroy the Cloudgoat Scenario
- 7.11 Privilege Escalation Section Quiz
Certificate of Completion and 14 CPEs
Earn more than just knowledge—gain credentials that advance your career. Upon successfully completing our AWS Penetration Testing course, you'll receive:
- An industry-recognized certificate validating your cloud security expertise
- 14 Continuing Professional Education (CPE) credits applicable toward CISSP, CEH, and other major certifications
Show off your accomplishment.

Enhance Your Security Journey
Complement your AWS penetration testing skills with these foundational courses designed for security professionals at any level. These introductory programs work seamlessly with your cloud security training to build a well-rounded cybersecurity skill set.