Shaping the future of IT skills

Maximising IT performance through learning

NotSoSecure Hacking and Securing Cloud Infrastructure




Show Tabs

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. This course covers both the theory a well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.

Prior pentest / security experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common Unix command line syntax will be beneficial.

Prerequisites & Audience

Who Should Take This Class?

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level.

Prior Pen Test experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common command line syntax will be greatly beneficial.

Student Requirements

Delegates must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicated for the VM.

Course Benefits
Our own customized version of kali linux with inhouse developed scripts and tools to help with hacking auditing and securing Cloud.
Course Topics
  • Introduction to Cloud Computing
    • Introduction to cloud and why cloud security matters
    • Comparison with conventional security models
    • Shared responsibility model
    • Legalities around Cloud Pentesting
  • Enumeration of Cloud environments
    • DNS based enumeration
    • OSINT techniques for cloud-based asset
  • Gaining Entry in Cloud Environment
    • Serverless based attacks (AWS Lambda / Azure & Google functions)
    • Web application Attacks
    • Exposed Service ports
  • Attacking Specific Cloud Services
    • Storage Attacks
    • Azure AD Attacks
    • Containers and Kubernetes Clusters
    • IAM Misconfiguration Attacks
    • Roles and permissions-based attacks
    • Attacking Cognito misconfigurations
  • Post - Exploitation
    • Persistence in Cloud
    • Post exploit enumeration
    • Snapshot access
    • Backdooring the account
  • Auditing and Benchmarking of Cloud
    • Preparing for the audit
    • Automated auditing via tools
    • Golden Image / Docker image audits
    • Relevant Benchmarks for cloud
  • Defense: Identification of cloud assets
    • Inventory Extraction for AWS, Azure and GCP
    • Continuous inventory management
  • Defense: Protection of Cloud Assets
    • Principle of least privilege
    • Control Plane and Data Plane Protection
    • Financial Protections
    • Metadata API Protection
    • Cloud specific Protections
    • Windows / Linux IaaS auditing
  • Defense: Detection of Security issues
    • Setting up Monitoring and logging of the environment
    • Identifying attack patterns from logs
    • Monitoring in multi-cloud environment
  • Defense: Response to Attacks
    • Automated Defense techniques
    • Cloud Defense Utilities
    • Validation of Setup

NotSoSecure courses

NotSoSecure Advanced Infrastructure Hacking - AIH
NotSoSecure The Art of Hacking - AoH
NotSoSecure Advanced Web Hacking - AWH
NotSoSecure Hacking and Securing Cloud Infrastructure
NotSoSecure AppSec for Developers - APPSEC
NotSoSecure DevSecOps - DEVSECOPS
NotSoSecure Hacking 101
We use cookies to understand how you use our site and to improve your experience. To learn more, click here. Read our revised Privacy Policy and Terms and Conditions.