YouTube
Blog
How to Break Into GRC 🥊 Mindset | Methods | Skills
AKYLADE Certified Cyber Resilience Fundamentals (A/CCRF) [CRF-002] - Simply Cyber Academy
AKYLADE Certified Cyber Resilience Practitioner (A/CCRP) [CRP-002] - Simply Cyber Academy
AKYLADE Cyber Risk Management Foundations (A/CRMF) [RMF-001]
Simply Cyber GRC Masterclass
Intro to AWS Pentesting
Study notes for Tyler Ramsbey's Intro to AWS Pentesting course
Feb 21, 2026
Register for Tyler’s course with my link here and I’ll send you my study notes.
1.0 Installing Pre-Requisites
www.cpatocybersecurity.com/p/aws-pentesting-1-0-installing-pre-requisites
2.0 Configuring the Lab Environment
www.cpatocybersecurity.com/p/aws-pentesting-2-0-configuring-the-lab-environment
3.3-3.5: IAM Enumeration Attack Chain - From Developer to Full S3 Access
CYBR lab in Intro to AWS Pentesting by Tyler Ramsbey
www.cpatocybersecurity.com/p/aws-pentesting-3-5-iam-enumeration-attack-chain-from-developer-to-full-s3-access
3.6 Challenge Lab: Use Pacu to Automate Enumeration
www.cpatocybersecurity.com/p/aws-pentesting-3-6-challenge-lab-use-pacu-to-automate-enumeration
4.1-4.4 AWS S3 Enumeration Basics (Pwned Labs)
www.cpatocybersecurity.com/p/4-1-4-4-aws-s3-enumeration-basics-pwned-labs
4.5-4.6 Exposing Credit Card Data Through S3 Misconfiguration
www.cpatocybersecurity.com/p/4-5-4-6-exposing-credit-card-data-through-s3-misconfiguration
5.1-5.5 Lambda Enumeration: Exploiting AWS EC2_SSRF CloudGoat Scenario
www.cpatocybersecurity.com/p/5-1-5-5-lambda-enumeration-exploiting-aws-ec2-ssrf-cloudgoat-scenario
5.6-5.8 From Lambda Leaks to EC2 Access
www.cpatocybersecurity.com/p/5-6-5-8-from-lambda-leaks-to-ec2-access
6.1-6.5 EC2 SSRF Challenge: From Virtual Machine Enumeration to Full Cloud Compromise
www.cpatocybersecurity.com/p/6-1-6-5-ec2-ssrf-challenge-from-virtual-machine-enumeration-to-full-cloud-compromise
6.6-6.7 Abuse SSRF and Access the S3 Bucket
www.cpatocybersecurity.com/p/6-6-6-7-abuse-ssrf-and-access-the-s3-bucket
6.8 Exploiting EC2 SSRF to Achieve Lambda Invocation - CloudGoat
www.cpatocybersecurity.com/p/6-8-exploiting-ec2-ssrf-to-achieve-lambda-invocation-cloudgoat
7.1-7.5 Privilege Escalation in AWS Lambda
www.cpatocybersecurity.com/p/7-1-7-5-privilege-escalation-in-aws-lambda
7.6-7.7 IAM Role Privilege Escalation in CloudGoat Lambda Attack
www.cpatocybersecurity.com/p/7-6-7-7-iam-role-privilege-escalation-in-cloudgoat-lambda-attack
7.8-7.10 [Challenge Lab] Assuming the Target Role and Privilege Escalation
www.cpatocybersecurity.com/p/7-8-7-10-challenge-lab-assuming-the-target-role-and-privilege-escalation
GRC "Cloudgoat" Challenge
Intro to AWS Pentesting Capstone Challenge #1
www.cpatocybersecurity.com/p/aws-elastic-beanstalk-security-pen-test-cloudgoat
9.1-9.3 Capstone Challenge #2 SNS Secrets
www.cpatocybersecurity.com/p/9-1-9-3-capstone-challenge-2-sns-secrets