# whoami

## Hey, I'm Tyler!

I'm a cyber security engineer with a decade of experience spanning numerous environments in technical and leadership roles.

I've always been passionate about my work and believe in giving back and sharing that knowledge. This blog is a side project where I share my insights and things I've learned from others. It's also become a handy "second brain" for me!&#x20;

### Connect with Me!

Feel free to connect with me on [LinkedIn](https://www.linkedin.com/in/typetty/)

***

## Projects and Community Involvement

### Instructor @ Pwned Labs

In my spare time I teach the [Pwned Labs Amazon Cloud Attack & Defense Bootcamp](https://bootcamps.pwnedlabs.io/placrtp-bootcamp) alongside cofounder Ian Austin.&#x20;

This is a live 4-week professional bootcamp teaching modern AWS attack and defense tradecraft used in real-world breaches and cloud security engagements. We work through hands-on assume-breach scenarios to compromise, audit, and defend AWS environments across identity, compute, and infrastructure services. At the end of the bootcamp, students will be prepared to demonstrate their skills in a 24 hour fully hands-on certification exam. Successful completion of the exam provides students with the **Pwned Labs Amazon Cloud Red Team Professional (ACRTP)** certification.

### Content Creator

My YouTube channel&#x20;

{% embed url="<https://www.youtube.com/@techwithtyler>" %}

Cyber ranges, labs, courses, and more I've created myself or with others&#x20;

<table><thead><tr><th width="118.67578125">Platform</th><th width="169.18359375">Content / Link</th><th>Description</th></tr></thead><tbody><tr><td>Pwned Labs</td><td><a href="https://pwnedlabs.io/cr/electra">Cyber Range - Electra</a></td><td>Electra is a multi-AWS account red team cyber range that I helped create with the team at Pwned Labs. It features a realistic enterprise environment requiring users to perform exploits and attack paths against common AWS services to achieve all 9 flags.</td></tr><tr><td>Pwned Labs</td><td><a href="https://pwnedlabs.io/labs/abuse-openid-connect-and-gitlab-for-aws-access">Lab - Abusing Identity Providers in AWS</a></td><td>Get hands-on in navigating and exploiting real-world cloud vulnerabilities. You'll begin with ReadOnly access to an AWS account, uncover a misconfigured GitLab Identity Provider Trust Policy, exploit it, and ultimately compromise the account.</td></tr><tr><td>Pwned Labs</td><td><a href="https://pwnedlabs.io/labs/remediate-risks-with-prowler-and-aws-security-hub">Lab - Prowler and AWS Security Hub</a></td><td>Get hands-on with Prowler, an open-source cloud security tool, to scan an AWS environment for misconfigurations. You'll learn how to centralize findings in AWS Security Hub and set up automated remediation workflows using AWS EventBridge and Lambda functions.</td></tr><tr><td>Pwned Labs</td><td><a href="https://blog.pwnedlabs.io/abusing-identity-providers-in-aws">Blog - Abusing Identity Providers in AWS</a></td><td>Abuse the GitLab OIDC Identity Provider to gain access to and compromise an AWS account.</td></tr><tr><td>Pwned Labs</td><td><a href="https://blog.pwnedlabs.io/building-security-guardrails-with-aws-resource-control-policies">Blog - Building Security Guardrails with AWS Resource Control Policies</a></td><td>Leverage AWS Resource Control Policies (RCPs) to protect your AWS resources from external threats. </td></tr><tr><td>Pwned Labs</td><td><a href="https://blog.pwnedlabs.io/defending-against-the-whoami-attack-with-aws-declarative-policies">Blog - Defending Against the whoAMI Attack with AWS Declarative Policies</a></td><td>Leverage AWS Declarative Policies to prevent the whoAMI attack and better control the use of AMIs in your AWS environment</td></tr><tr><td>Cybr</td><td><a href="https://cybr.com/courses/terraform-on-aws-from-zero-to-cloud-infrastructure/">Course - Terraform on AWS: From Zero to Cloud Infrastructure</a></td><td><p>This is a course I built and collaborated on with Christophe Limpalair from Cybr.com.</p><p>Together, we've crafted a comprehensive, hands-on learning experience. I developed the core technical content and lab scenarios, while Christophe enhanced the course with video lessons and contributed additional technical topics to provide a well-rounded learning experience.</p></td></tr><tr><td>Cybr</td><td><a href="https://cybr.com/hands-on-labs/lab/encrypt-and-decrypt-data-with-kms-and-data-keys/">Lab — Encrypt and Decrypt Data with KMS and Data Keys</a></td><td>In this lab, we'll get hands-on experience using a KMS Customer Managed Key (CMK) and symmetric encryption to encrypt and decrypt data. We'll learn how to perform these functions with the AWS CLI and the AWS Encryption SDK and how to manage data keys for data larger than 4096 bytes.</td></tr><tr><td>Cybr</td><td><a href="https://cybr.com/hands-on-labs/lab/secure-ec2-access-with-ssm-session-manager-and-kms/">Lab — Replace SSH with SSM Session Manager and KMS</a></td><td>Securely connect to your EC2 instances with AWS Systems Manager Session Manager. Session Manager lets you manage your Amazon EC2 instances through an interactive one-click browser-based shell or through the AWS CLI. After the session is started, you can run bash commands as you would through any other connection type, effectively replacing the need to SSH into instances. For added security, we can enable KMS session encryption with a customer managed key.</td></tr><tr><td>Cybr</td><td><a href="https://cybr.com/hands-on-labs/lab/create-a-static-s3-website-using-terraform/">Lab - Create Static AWS S3 Website with Terraform</a></td><td>Learn how to create and configure a static S3 website using only Terraform. This lab does not grant access to the AWS console, encouraging both least privilege and using Infrastructure as Code (IaC) to manage cloud infrastructure instead of ClickOps.</td></tr></tbody></table>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://www.techwithtyler.dev/welcome/whoami.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
