Advanced

Certified in Hacking and Defending the Cloud

NotSoSecure

With the rapid adoption of cloud infrastructure and the prevalence of hybrid cloud environments among organisations, the need to address cloud misconfigurations has become paramount. This course offers a comprehensive approach to understanding and mitigating misconfigurations in AWS, Azure, and GCP. From building and migrating to managing and innovating in the cloud, organisations face increasing pressure to secure their cloud infrastructure effectively.

Who Should Attend

  • Cloud administrators and architects
  • Penetration testers and red teamers
  • Blue teams, CSIRT / SOC analysts, and responders
  • Cloud developers & engineers
  • Security & IT managers and team leads

Prerequisites

  • Basic to intermediate knowledge of cybersecurity (1.5+ years' experience)
  • Experience with common command line syntax
  • This course is suitable for anyone with a stake or interest in cloud security, from technical practitioners to decision makers

What You Will Learn

  • Core concepts of cloud computing and the shared responsibility model
  • Cloud asset enumeration using DNS-based and OSINT techniques
  • Attack surfaces of IaaS, FaaS, PaaS, and CaaS service models
  • Cloud storage security in AWS S3, GCP Storage, and Azure
  • Microsoft Azure and Entra ID attack techniques and defenses
  • AWS IAM, Lambda, API Gateway, ECR, and ECS exploitation
  • GCP security including IAM, Compute Engine, and Cloud Functions
  • Cloud defense using open-source and cloud-native tools
  • Auditing and benchmarking cloud environments using CIS benchmarks

Course Outline

Labs & Practical Exercises

This course is aimed at technical and security specialists looking to develop and operate secure applications and systems using an agile DevOps methodology with fully automated deployments to cloud environments. Hands-on labs cover real-world cloud attack and defense scenarios across AWS, Azure, and GCP.

Certification & Assessment

Certificate of Completion. This course equips participants with the knowledge and skills necessary to build secure applications and network equipment for the telecom sector, addressing the unique security challenges of IP-based telecommunication and IoT devices.

Cookie Consent

We use cookies to enhance your browsing experience, analyse site traffic, and personalise content. By clicking "Accept All", you consent to our use of cookies. You can manage your preferences or learn more in our Privacy Policy.