Select Page

cloud penetration

testing and defenses 

Advanced cloud penetration testing and defenses training is designed to focused on addressing the critical issues on cloud environment and provide a systematic solution for defending the workload .On-premises environments have been moving to the cloud for last decade. The global business analysis predicts that almost all companies will have workloads in public and other cloud environments very shortly. when it comes to assessing risk to businesses, we need to be prepared to evaluate cloud-delivered services’ security. In advance cloud penetration testing and defenses training, you will learn the penetration testing techniques focused on cloud and assess cloud environments.

Cloud penetration testing

REAL LIFE CASE STUDIES

INSTRUCTOR-LED SESSIONS

INDUSTRY DRIVEN CERTIFICATION

DAILY ASSIGNMENTS

STUDENT LEARNING KIT

 

syllabus

syllabus

Cloud Penetration testing and Defenses 1
module 1 : Understand Cloud Computing Essentials
  • Cloud Computing Definitions, Cloud Computing Roles ( cloud service customer, cloud service provider, cloud service partner, cloud service broker)
  • Cloud Building Block Technologies ( virtualization, storage, networking, databases, orchestration)
  • Cloud Shared Considerations (interoperability, portability, reversibility,
    availability, security, privacy, resiliency,performance, governance, maintenance and versioning, service levels and Service Level Agreements (SLA), auditability, regulatory)
  • Cloud Secure Data Lifecycle ,Cloud based Disaster Recovery (DR) and Business Continuity (BC) planning, Cost Benefit Analysis ,Functional Security Requirements ( portability, interoperability, vendor lock-in)
Cloud Penetration testing and Defenses 2
module 2 : Intital footprinting
  • Cloud pentesting Methodologies
  • Infrastructure Components
  • TOS and ROE 
  • DNS based enumeration
  • OSINT techniques for cloud-focused assets
  • Host Discovery and mapping the infrastructure
  • Git Mirroring and Discovering Artifacts
  • Services and Databases enumeration in the Cloud
  • Abusing Databases for Privileges Escalation purposes
  • Recon and Discovery through Visual Tracking
  • Web Services enumeration and intial access
  • User Privilege Enumeration with AWS cli
Cloud Penetration testing and Defenses 3
module 3 : hunting with AWS
  • Authentication and authorization in APIs
  • Identifying undisclosed APIs and how they can be used
  • Initial foothold with Accessing lambda functions
  • Enumerating s3 buckets
  • Executing ec2 instances, and decrypting sensitive data.
  • Automation with cloud enumeration and hunting the insecurities 
Cloud Penetration testing and Defenses 4
module 4 : hunting with AZURE
  • Azure Active Directory mapping
  • Working with hacker tools and techniques in AD environments
  • Windows Containers essentials
  • Azure user Roles mapping
  • VHD and Volume Shadow Copies
  • SAML and Microsoft ADFS basics
  • Office365 essentials and azure cli tools
  • Microsoft Graph API essentials
  • Initial foothold and hunting in Microsoft azure cloud
Cloud Penetration testing and Defenses 5
module 5 : Cloud native services exploitation
    • AWS IAM Metadata exploring
    • Kubernetes and common issues
    • TravisCI , Jenkins and Git Actions
    • Moving Laterally Across Containers
    • Privileged and Unprivileged Containers
    • Backdooring Containers
    • Backdooring CI/CD pipeline
    • Discovering Routes and Hidden Consoles
    • SSRF Impacts on Cloud Environments
    • Command Line Injections
    • SQL Injections in native applications
    • Injecting Functionless Environments Using Lambda Shell
    • Credential Stuffing and Leveraging Password Methodologies
    • Backdooring Web Applications with Tokens
    • Load Balancer and Proxy Abuse
    • Windows Backdoors and controls
Cloud Penetration testing and Defenses 6
module 6 : Security Auditing of IAM, EBS and S3
  • Audit user accounts and credentials
  • Review Identity and Access Management (IAM) best practices
  • Exploring AWS Key Management Services (KMS)
  • how to protect EC2 key pairs
  • how to use encrypted EBS volumes
  • AWS CloudHSM Security. 
  • Security and Access Control Introduction
  • S3 Object Encryption & Uploading and Object with Server Side Encryption

 

Cloud Penetration testing and Defenses 7
module 7 : Enterprise AWS cloud defense in depth
  •  Working with the AWS Web Application Firewall , NACL and Security groups
  •  Cryptographic Services, covers the basics of cryptographic services; IPsec fundamentals, IPsec in AWS; and AWS Certificate Manager.
  • Logging and Monitoring in cloud – security reporting and logging in AWS; activating Flow Logs and Region-based CloudTrail .
  • Auditing –  Pre-Audit Tasks, and concludes with a look at additional security services offered in an AWS environment.
bomb hack
module 8 : Enterprise AZURE cloud defense in depth
  • Implement enterprise governance strategies including role-based access control, Azure policies, and resource locks.
  • Implement an Azure AD infrastructure including users, groups, and multi-factor authentication.
  • Implement Azure AD Identity Protection including risk policies, conditional access, and access reviews.
  • Implement Azure AD Privileged Identity Management including Azure AD roles and Azure resources.
  • Implement Azure AD Connect including authentication methods and on-premises directory synchronization
  • Implement perimeter security strategies including Azure Firewall.
  • Implement network security strategies including Network Security Groups and Application Security Groups.
  • Implement host security strategies including endpoint protection, remote access management, update management, and disk encryption.
  • Implement container security strategies including Azure Container Instances, Azure Container Registry, and Azure Kubernetes.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted.
  • Implement storage security strategies including shared access signatures, blob retention policies, and Azure Files authentication.
  • Implement database security strategies including authentication, data classification, dynamic data masking, and always encrypted. 
who should attend this training?
  • Junior pentesters

  • Solution Architect

  • System Administrators

  • Network Administrators

  • SecOps Engineers

  • SysOps admins

  • Cloud Security Auditors

  • Security Professionals

why should i take this training?

The businesses are now focusing on cloud deployment models. The future of penetration testing belongs to the cloud. In this case, one should upgrade himself to explore the most critical area of modern infrastructures. Enhance your skill in cloud security assessment, develop the strategies and audit policies the defend the overall cloud environments.  

prerequisite of the training ?

The person should familiar with AWS and Microsoft cloud environments. 

What is the duration of the training ?
It’s an Instructor-led online training and
the total duration of the training is 30 hours.

For More Details about cloud penetration testing and defenses  contact us

4 + 3 =

Our clients

Testimonials

Today I’ve completed my one 2 one online training by Mr Naresh sir from Certcube Labs .
This is the first time I have attended a class in this format and wondered how effective it would be. It was very effective and therefore I would definitely be interested in attending other classes in the same format. The instructor was very knowlegeable and provided a wealth of information about the current version, especially since the last version I used was several releases ago.
Satyam Singh

BCA, Delhi University

A good place to learn every small detail in cybersecurity.Really nice and helpful teacher.

subhum

Btech, BITS Mesra

together Let’s Create the future

15 + 6 =