Course Summary

This Evergreen Alliance training program for SEC588: Cloud Penetration Testing equips participants with the comprehensive skill set needed to effectively assess cloud environments. Whether you are an experienced penetration tester looking to extend your expertise to the cloud or a cloud security architect or defender aiming to understand how attackers exploit cloud infrastructures, this course is tailored to meet your needs.

The curriculum covers both foundational and advanced topics, including classic cloud components like virtual machines and storage buckets, as well as emerging issues such as microservices, in-memory data stores, serverless functions, cloud-based file storage, Kubernetes, and containers. Participants will also delve into penetration testing techniques specific to AWS and Azure, the two dominant platforms accounting for over half of the cloud market. The focus is on evaluating and reporting on real-world risks organizations face when these services are misconfigured or insecure.

Key topics include:

Cloud Penetration Testing Fundamentals, Environment Mapping, and Service Discovery
AWS and Azure Cloud Services and Attack Techniques
Cloud-Native Applications, Containers, and CI/CD Pipeline Security

This course is designed to empower you with practical skills to identify and mitigate cloud security risks effectively.

You will learn to:

AWS Authentication and Cloud Services
Candidates will showcase expertise in AWS authentication methods, including Identity and Access Management (IAM) structures, policies, and identities. This includes understanding privilege escalation scenarios within AWS environments. Additionally, candidates must demonstrate proficiency in Amazon Key Management Service (KMS), AWS Lambda functions, and the use of exploitation tools for AWS platforms.

Azure Functions and Windows Containers
Candidates will exhibit knowledge of Azure Functions, their capabilities, and the distinctions between Azure Functions and AWS Lambda. This includes code execution within the Azure environment, leveraging Windows Containers, and using tools like Microsoft Graph.

Cloud CLI and Application Mapping
Candidates will demonstrate familiarity with AWS and Azure CLI structures, as well as the ability to map applications through APIs and HTTP requests.

Cloud-Native Applications and CI/CD Pipelines
Candidates will provide examples of cloud-native applications and CI/CD pipelines, highlighting their structure, functionality, and vulnerabilities. This includes identifying security flaws within these systems.

Cloud Penetration Testing Fundamentals
Candidates will demonstrate foundational knowledge of penetration testing as applied to cloud environments. This includes recon, assessment, discovery, and navigating restrictions in public cloud infrastructures. Understanding the architecture and configurations of these infrastructures is also required.

Containers and Kubernetes Structure
Candidates will display proficiency in application deployment using containers, alongside knowledge of Kubernetes structures, configurations, and service meshes.

Discovering Cloud Services and Data Exposure
Candidates will identify sources of exposure within cloud environments, such as open ports, misconfigured services, exposed databases, secrets, and vulnerable developer tools or repositories.

Microsoft Azure Cloud Services and Attack Techniques
Candidates will demonstrate knowledge of Microsoft Azure services, including web identity management, authentication standards, and common attacks targeting Azure users and services.

Password Attacks in Cloud Environments
Candidates will understand and apply methodologies for username harvesting and password attack techniques, using relevant tools in cloud environments.

Red Team Penetration Testing in Cloud Environments
Candidates will demonstrate expertise in Red Team penetration testing processes, including exploitation techniques, payload development, and the tools used in these activities.

Redirection and Attack Obfuscation
Candidates will understand techniques for command obfuscation, domain fronting, pivoting, and attack structure concealment through proxies and other tools.

Web Application Attacks in Cloud Contexts
Candidates will demonstrate proficiency in identifying and exploiting common web application vulnerabilities, with a focus on their impact on cloud-native applications and serverless functions.

There are currently no prerequisites for this course. However the following courses is recommended prior: SEC488: Cloud Security Essentials SEC542: Web Application Penetration Testing and Ethical Hacking SEC540: Cloud Security and DevOps Automation SEC560: Network Penetration Testing and Ethical Hacking

proctored exam 75 questions 2 hours Minimum passing score of 70%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?