Offensive Cloud Security Training

  • Learn via: Classroom / Virtual Classroom / Online
  • Duration: 2 Days
  • Price: Please contact for booking options
  • We can host this training at your preferred location. Contact us!
Upcoming Training
17 July 2023
2 Days

This 2-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.


Prior pentest / security experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common Unix command line syntax will be beneficial.

Designed for Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, Security Auditors, security enthusiasts and anyone who wants to take their skills to next level.


Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This course covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.

INTRODUCTION TO CLOUD COMPUTING

  • What is cloud and Why it matters
  • Types of clouds and cloud services
  • What changes from conventional security models
  • Shared responsibility model (pizza as a service v2.0)

ATTACKING CLOUD SERVICES

  • Conventional vs cloud infra assessment
  • Legalities around Cloud Pentesting
  • How to approach pentesting cloud services
  • Understanding Metadata API
  • Understand the attack surface in each type of cloud
  • Enumerating for cloud assets

GAINING ENTRY IN CLOUD ENVIRONMENT

  • Lambda attacks
  • Web application Attacks
  • Exposed Service ports

ATTACKING SPECIFIC CLOUD SERVICES

  • Storage Attacks
  • Azure AD Attacks
  • Financial Attacks
  • IAM Attacks : Shadow admins
  • Dormant assets
  • Google Dorking in Cloud Era

POST - EXPLOITATION

  • Maintain access after the initial attack
  • Post access asset enumeration
  • Extracting secrets from Snapshot access

DEFENDING THE CLOUD ENVIRONMENT

  • Setting up Monitoring and logging of the environment
  • Catching attacks using monitoring and logging
  • Metadata API Protection

HOST BASE DEFENCES FOR IAAS

  • Windows server auditing
  • Linux Server Auditing

AUDITING AND BENCHMARKING OF CLOUD

  • Prepare the environment for the audit
  • Automated auditing using open source tools
  • Golden Image / Docker image audits
  • Relevant Benchmarks for cloud
  • Continuous inventory monitoring
  • Continuous monitoring to Detect changes in cloud environment


Contact us for more detail about our trainings and for all other enquiries!

Upcoming Trainings

Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.

17 July 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
03 August 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
12 August 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
27 August 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
07 September 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
11 September 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
25 September 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
14 October 2023

Classroom / Virtual Classroom

Istanbul, Ankara, London
By using this website you agree to let us use cookies. For further information about our use of cookies, check out our Cookie Policy.