User log in
User registration
Registrations are open
Click here to register
Email: forgotten email?
Password: lost pass?
  Resend activation email
Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Get VPN Now for FREE! Protect your privacy! Use a VPN When Downloading Torrents
Your IP Address is . Location is .
Your Internet Provider is tracking your torrent activity! Hide your IP ADDRESS with a VPN!
We strongly recommend using Trust.Zone VPN to anonymize your torrenting. It's FREE!
Autumn deal! 75% off! Also, while you are using Tz0bb157rush51910dt.rd2a439Zone VPN you get No Ads for Demonoid members Get h51910dVPN Nh51910dow for FREycb4455Ehd95e00!
Details for PentesterAcademy | Cloud Security: AWS Bootcamp [2021] [FCO]
Created by Ratio: 1.00SaM 10 days ago
Lynda and other Courses >>>
Forum for discussion >>>

Author: Jeswin Mathai
Language: English
Released: 13 June 2021
Duration: 19h 37m 55s
Course Source:


Most AWS deployments are breached by a common set of vulnerabilities which attackers repeatedly use.

In 5 weeks, this bootcamp teaches you to identify, exploit and secure vulnerabilities in the 5 most commonly used AWS components, so you can be a job-ready Cloud Security practitioner.

What You'll Learn

The syllabus of this bootcamp focuses on the teaching you the fundamentals and exploits for the 5 most commonly used components in AWS deployments:

1. Identity and Access Management (IAM)
2. API Gateway
3. Lambda
4. Cloud Databases
5. Simple Storage Service (Amazon S3)

To further consolidate your skills, you will be prepared to take our exam and earn the Pentester Academy Cloud Security Professional (PACSP) certification.

Build Your Cybersecurity Credentials

- Become a Pentester Academy Cloud Security Professional (PACSP)

The PACSP is proof that you’ve mastered the basics of the five most commonly used components in an AWS cloud deployment. The exam prepares you for real-world scenarios in pentesting production cloud deployments in AWS – a useful addition to the arsenal of any professional pentester.

- Bootcamp Completion Certificate
Attendees will also get a course completion certificate after attending all 5 live sessions.


1. A basic knowledge of computers and networking
2. Familiarity with the Linux operating system
3. An AWS Account

About Instructor

Jeswin Mathai

He has published his work at DEFCON China, RootCon, Blackhat Arsenal, and Demo labs (DEFCON). He has also been a co-trainer in classroom trainings conducted at HITB, RootCon, OWASP NZ Day. He has a Bachelor degree from IIIT Bhubaneswar. He was the team lead at InfoSec Society IIIT Bhubaneswar in association with CDAC and ISEA, which performed security auditing of government portals, conducted awareness workshops for government institutions. His area of interest includes Malware Analysis and Reverse Engineering, Cryptography, WiFi security, and Web Application Security.

Facebook Twitter Digg Reddit LinkedIn StumbleUpon Email
Show Demonoid some love with BitCoin: 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk How to get BitCoins?
Peers: 21 seeders, 5 leechers, 435 total - Updated: 2 hours ago
Size: 3.81 GB  

Sponsored links
Related torrents
Torrents you may also like:
Download this torrent
Extra information
Tracker: udp://
Torrent hash: 10A76ED7 5685B0AD 4CA682F6 6F384406 413DEDB1
Files described inside the torrent: 10 [ Click here to show the full list ]
No comments posted yet

Disclaimer: None of the files shown here are actually hosted or transmitted by this server. The links are provided solely by this site's users. The site moderation is also a service provided by the site's users. The administrator of this site ( cannot be held responsible for what its users post, or any other actions of its users. You may not use this site to distribute or download any material when you do not have the legal rights to do so. It is your own responsibility to adhere to these terms.

By using this site you indicate your agreement to our terms and conditions
Link to us | Contact us | API | Commemoration | Feeds/RSS | DMCA
This site and the Demonoid logo are Copyright © Demonoid. All rights reserved.

Show Demonoid some love with 1DNoidyJgB159bLJT5hDnCkZ4uQrhkfBVk