AWS Labs

Hands-on Cloud Security & DevOps

Practice real-world AWS tasks in a safe, guided environment. No AWS account setup required.

About This Track

Explore our curated AWS lab modules designed to teach cloud security, IAM roles, S3 vulnerabilities, Lambda exploitation, and more. These labs are built for learners who want to gain real-world AWS experience in a safe, browser-accessible environment.

Start with the basics like Identity & Access Management (IAM) and move on to advanced topics like privilege escalation, serverless abuse, and cloud incident response.

Each lab includes step-by-step instructions, hints, flags to capture, and automated scoring.

16+

Total Labs

4.8

Avg Rating

5K+

Students

95%

Success Rate

Progress Overview

Beginner

8

Labs Available

Intermediate

5

Labs Available

Advanced

3

Labs Available

Filter Available Labs

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security

S3 Bucket Misconfigurations

Learn to identify and exploit common S3 security misconfigurations in this hands-on lab.

Storage Security

IAM Privilege Escalation

Discover and exploit IAM misconfigurations that lead to privilege escalation attacks.

Identity & Access

Lambda Function Exploitation

Learn serverless security by exploiting vulnerable Lambda functions and their configurations.

Serverless Security