Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Hacking and Securing Cloud Infrastructure

( Duration: 2 Days )

This Hacking and Securing Cloud Infrastructure training course provides skills to cut through the mystery of Cloud Services (including AWS, Azure and G-Cloud) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.

By attending Hacking & Securing Cloud Infrastructure workshop, delegates will:

  • Learn hacking, auditing and securing Cloud.

The Hacking & Securing Cloud Infrastructure class is ideal for:

  • Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level. Prior Pen Test experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common command line syntax will be greatly beneficial.

COURSE AGENDA

1

Introduction To Cloud Computing

  • Introduction to cloud and why cloud security matters
  • Comparison with conventional security models
  • Shared responsibility model
  • Legalities around Cloud Pentesting
2

Enumeration Of Cloud Environments

  • DNS based enumeration
  • OSINT techniques for cloud-based assets
3

Gaining Entry In Cloud Environment

  • Serverless based attacks (AWS Lambda / Azure & Google functions)
  • Web application Attacks
  • Exposed Service ports
4

Attacking Specific Cloud Services

  • Storage Attacks
  • Azure AD Attacks
  • Containers and Kubernetes Clusters
  • IAM Misconfiguration Attacks
  • Roles and permissions-based attacks
  • Attacking Cognito misconfigurations
5

Post - Exploitation

  • Persistence in Cloud
  • Post exploit enumeration
  • Snapshot access
  • Backdooring the account
6

Auditing And Benchmarking Of Cloud

  • Preparing for the audit
  • Automated auditing via tools
  • Golden Image / Docker image audits
  • Relevant Benchmarks for cloud
7

Defense: Identification Of Cloud Assets

  • Inventory Extraction for AWS, Azure and GCP
  • Continuous inventory management
8

Defense: Protection Of Cloud Assets

  • Principle of least privilege
  • Control Plane and Data Plane Protection
  • Financial Protections
  • Metadata API Protection
  • Cloud specific Protections
  • Windows / Linux IaaS auditing
9

Defense: Detection Of Security Issues

  • Setting up Monitoring and logging of the environment
  • Identifying attack patterns from logs
  • Monitoring in multi-cloud environment
10

Defense: Response To Attacks

  • Automated Defense techniques
  • Cloud Defense Utilities
  • Validation of Setup

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X