25,000+ Courses Nationwide
0345 4506120

Hacking and Securing Cloud Infrastructure

This 2-day course cuts through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.

Designed for Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, Security Auditors, security enthusiasts and anyone who wants to take their skills to next level.

Select specific date to see price, venue and full details.

Learning Objectives

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This course covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.

Pre-Requisites

Prior pentest / security experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common Unix command line syntax will be beneficial.

Course Content

INTRODUCTION TO CLOUD COMPUTING

  • What is cloud and Why it matters
  • Types of clouds and cloud services
  • What changes from conventional security models
  • Shared responsibility model (pizza as a service v2.0)

ATTACKING CLOUD SERVICES

  • Conventional vs cloud infra assessment
  • Legalities around Cloud Pentesting
  • How to approach pentesting cloud services
  • Understanding Metadata API
  • Understand the attack surface in each type of cloud
  • Enumerating for cloud assets

GAINING ENTRY IN CLOUD ENVIRONMENT

  • Lambda attacks
  • Web application Attacks
  • Exposed Service ports

ATTACKING SPECIFIC CLOUD SERVICES

  • Storage Attacks
  • Azure AD Attacks
  • Financial Attacks
  • IAM Attacks : Shadow admins
  • Dormant assets
  • Google Dorking in Cloud Era

POST - EXPLOITATION

  • Maintain access after the initial attack
  • Post access asset enumeration
  • Extracting secrets from Snapshot access

DEFENDING THE CLOUD ENVIRONMENT

  • Setting up Monitoring and logging of the environment
  • Catching attacks using monitoring and logging
  • Metadata API Protection

HOST BASE DEFENCES FOR IAAS

  • Windows server auditing
  • Linux Server Auditing

AUDITING AND BENCHMARKING OF CLOUD

  • Prepare the environment for the audit
  • Automated auditing using open source tools
  • Golden Image / Docker image audits
  • Relevant Benchmarks for cloud
  • Continuous inventory monitoring
  • Continuous monitoring to Detect changes in cloud environment

Related Courses

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the requested service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

We work with the best