@Cybrcom - 75 本の動画
チャンネル登録者数 2万人
Welcome to Cybr's official YouTube channel! Your Go-To Resource for AWS Cloud Security Training 🔒, Hands-on AWS Security Labs 🛠️, and AWS Security Tutorials....
54:11
Your First Security AI Agent with Strands & Bedrock
59:18
Introduction to AWS IAM Enumeration
1:07
Easily prevent cloud misconfigurations before they deploy #cloudcomputing #cloudsecurity
14:04
5 IaC security issues you need to fix
2:23
Detect cloud drift before attackers do
1:04:32
Intro to Serverless: Deploy Your First AWS Lambda Function
1:14:45
AWS Security Automation: Detect & Quarantine Suspicious Activity
49:18
Discover AWS Organization IDs via S3 Buckets
1:07:56
Create your own security observability dashboards in AWS
1:03:41
Crack the AWS Security Specialty: Interactive Study Group (07/2025)
1:14:32
Vibe coding AWS infrastructure with Terraform...does it work?
1:07:53
Getting Started With the AWS CLI
58:43
Hands-On Lambda Enumeration: Find Risky Functions in AWS
1:18:58
Crack the AWS Security Specialty: Interactive Study Group
1:09:54
Why GRC in the Cloud Matters
0:29
Why GRC in the Cloud Matters?
1:06:56
AWS S3 Ransomware: Live Attack Demo & Defense Strategies
1:00:01
What hackers know about your AWS account
2:47
Enumerate AWS Account IDs from S3 buckets #s3 #aws #awssecurity #cloudsecurity #pentesting
10:44
Enumerate AWS Organization IDs via S3 Buckets - [Cybr Lab]
2:28
2 new AWS ransomware attack techniques #cloudsecurity #aws #awssecurity #ransomware
13:26
Get ANY AWS account ID from S3 buckets - [Cybr Lab]
10:01
how hackers use this AWS ransomware attack
19:40
find AWS SECURITY ISSUES in minutes (OSS)
52:51
Emulate Cloud Adversaries using Stratus Red Team (with creator Christophe Tafani-Dereeper)
10:59
Centrally manage root access for AWS multi-account security
13:08
build actually useful AWS detection rules from real-world attack logs
6:03
This attack is targeting AWS accounts and it involves AI
7:42
Automated attack simulation in AWS for Red Teaming
1:26:38
AWS Certified Security Specialty Study Group - Session 2
12:22
Intro to S3 Enumeration - Free Lab Walkthrough
1:03:06
AWS IAM Privilege Escalation Attacks & Defenses
1:30:09
AWS Certified Security Specialty - Study Group Session 1
1:03:43
Getting Started Using Terraform on AWS with Chris Williams
51:36
Securing Cloud Environments with Prowler (Live Training with Toni de la Fuente)
3:37
2 common cloud security issues and how to fix them // Explained in 180
14:51
Intro to AWS IAM Enumeration - Free Lab Walkthrough
17:27
Getting started with the AWS CLI for Enumeration - Free Lab Walkthrough
15:50
Enumerating Secrets in AWS Secrets Manager - Lab Walkthrough
21:32
AWS IAM PrivEsc to S3 data - Cybr CTF Walkthrough
1:17:47
Beginner's Guide to AWS CloudTrail for Security - Full Course
0:56
What does an AWS IAM PrivEsc look like? #cloudsecurity #aws
1:00
AWS re:invent 2023 Security Updates (Part 4) #inspector #awssecurity #cloudsecurity
1:00
AWS re:invent 2023 Security Updates (Part 3) #detective #awssecurity #cloudsecurity
1:00
AWS re:invent 2023 Security Updates (Part 2) #guardduty #containers #ecs
0:55
AWS re:invent2023 Security Updates #awssecurity #cloudsecurity #iam #reinvent2023
8:11
AWS Security Hub: Getting Started & Practical Demo
17:01
Security monitoring for your AWS environments with open source tools
10:09
Use Terraform? You NEED this for security!
12:08
This is how crypto miners hijack AWS accounts
11:04
intro to AWS PENTESTING (with Pacu)
0:39
SAST in 38 seconds
3:34
SAST // Explained in 180
0:59
AWS WAF in 59 seconds
0:48
Which programming language should I learn first for cybersecurity?
10:19
AWS WAF Made Simple: Protect Your Web Apps In The Cloud | Full Tutorial
4:20
The 5 Cybersecurity Tools You Should Know // Explained in 180
4:08
What are SQL Injections? // Explained in 180 seconds
3:39
HashiCorp Vault Explained in 180 seconds
0:43
This Security+ course syllabus is insane
5:16
4 things that surprised me about the CompTIA Security+ exam
4:14
What are switches for? Layer 2 devices from the OSI Model
6:11
How to run sqlmap as an API server and client
5:43
sqlmap's Risk and Level options explained (SQL Injections)
37:25
Wireless Deauthentication Attacks - Full Course
2:59
Install Docker on Kali Linux in under 3 minutes
36:16
Beginner's Guide to sqlmap - Full Course
1:03:36
Set up and use a WiFi Deauther (Spacehuhn Tech on ESP8266)
3:45
Hacking Tesla with a Blind XSS vulnerability (real case study)
7:19
Cross-Site Scripting (XSS) Explained in 7 minutes
1:21:09
Introduction to OS Command Injections - Full Course
1:41:52
SQL Injections: The Full Course
8:53
Blind SQL Injections with SQLMap against the DVWA
3:40
Install OWASP Juice Shop on Kali [Fastest Method]
2:04:47
Introduction to Application Security - Course