Select Search Category
Hacking and Securing Cloud Infrastructure

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a cloud computing environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical to ensuring optimum cloud security.

This course covers both the theory as well as a number of modern cloud hacking techniques that may be used to compromise various Cloud services and infrastructure, including various cloud defense strategies.

Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.

Topics covered include:
 >

              <div class=
  • Introduction to Cloud Computing

  • Enumeration of Cloud environments

  • Gaining Entry in Cloud Environment

  • Attacking Specific Cloud Services 

  • Post - Exploitation

  • Auditing and Benchmarking of Cloud

  • Defense: Identification of cloud assets

  • Defense: Protection of Cloud Assets

  • Defense: Detection of Security issues 

  • Defense: Response to Attacks 

Session FAQ

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to the next level.

Prior pentest experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common command line syntax will be greatly beneficial.

Students must bring their own laptops and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre-installed. A customized version of Kali Linux (ova format) containing custom tools and the scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM.

Numerous scripts and tools (some public and some NotSoPublic) will also be provided during the training, along with the student handouts.

Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class.

Anant Shrivastava