SEC588: Cloud Penetration Testing

Enquiry
Programme CodeD175A
Domain
Cybersecurity
Software Engineering
Level
Intermediate
Learning Partner(s)
SANS Institute
Duration
6 Days
FormatIn-person
Rating
Job Roles
ICT&SS Professional

Overview

Equip yourself with the latest in cloud-focused penetration testing techniques to assess cloud environments. The programme dives into topics of classic cloud Virtual Machines, buckets, and other new issues that appear in cloud-like microservices, in-memory data stores, files in the cloud, serverless functions, Kubernetes meshes, and containers.

You will also learn specific tactics for penetration testing in Azure and Amazon Web Services (AWS), particularly important given that AWS and Microsoft account for more than half the market. It's one thing to assess and secure a data centre, but it takes a specialised skillset to truly assess and report on the risk that an organisation faces if its cloud services are left insecure.

Key Takeaways

At the end of this programme, you will be able to:

  • Draw from many skill sets required to properly assess a cloud environment
  • Apply penetration tester skills into cloud environments
  • Identify how attackers are abusing cloud infrastructure to gain a foothold in your environments as a cloud-security-focused defender or architect

Who Should Attend

  • Please refer to the job roles section.
  • Both attack-focused and defense-focused security practitioners will benefit greatly from SEC588 by gaining a deep understanding of vulnerabilities, insecure configurations, and the associated business risks to their organisations. This programme benefits Penetration Testers, Vulnerability Analysts, Risk Assessment officers, DevOps Engineers, Site Reliability Engineers, and those working in many other areas.

Prerequisites

This programme has many labs, so you must come prepared with the following base level of knowledge:

  • Familiarity with Linux bash - Not expert level, but a base understanding.
  • Basic familiarity with Azure and AWS CLI tools - Watching a simple introductory video will suffice.
  • Base understanding of networking and TCP/IP.
  • Rudimentary understanding of the Metasploit CLI console.
  • Understanding how pivots work.

Testimonials

I found the contents on cloud and the various CSP useful. The content allows me to further apply it to my daily work.

The programme heightened my awareness of how systems can be attacked.

Learning about security and penetration testing on the cloud was valuable.