Overview
Equip yourself with the latest in cloud-focused penetration testing techniques to assess cloud environments. The programme dives into topics of classic cloud Virtual Machines, buckets, and other new issues that appear in cloud-like microservices, in-memory data stores, files in the cloud, serverless functions, Kubernetes meshes, and containers.
You will also learn specific tactics for penetration testing in Azure and Amazon Web Services (AWS), particularly important given that AWS and Microsoft account for more than half the market. It's one thing to assess and secure a data centre, but it takes a specialised skillset to truly assess and report on the risk that an organisation faces if its cloud services are left insecure.
Key Takeaways
At the end of this programme, you will be able to:
- Draw from many skill sets required to properly assess a cloud environment
- Apply penetration tester skills into cloud environments
- Identify how attackers are abusing cloud infrastructure to gain a foothold in your environments as a cloud-security-focused defender or architect
Who Should Attend
- Please refer to the job roles section.
- Both attack-focused and defense-focused security practitioners will benefit greatly from SEC588 by gaining a deep understanding of vulnerabilities, insecure configurations, and the associated business risks to their organisations. This programme benefits Penetration Testers, Vulnerability Analysts, Risk Assessment officers, DevOps Engineers, Site Reliability Engineers, and those working in many other areas.
Prerequisites
This programme has many labs, so you must come prepared with the following base level of knowledge:
- Familiarity with Linux bash - Not expert level, but a base understanding.
- Basic familiarity with Azure and AWS CLI tools - Watching a simple introductory video will suffice.
- Base understanding of networking and TCP/IP.
- Rudimentary understanding of the Metasploit CLI console.
- Understanding how pivots work.