Hacking Cloud Infrastructure

Cut through the mystery of cloud services on our 2 day course.

This 2-day course cuts through the mystery of Cloud Services (including AWS, Google Cloud Platform (GCP) and Azure) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing a traditional network infrastructure.

Note: Students will have access to a state-of-the-art Hacklab with a wide variety of vulnerabilities to practice exploitation and will receive a FREE 1 month subscription after the class to allow more practice time along with the support portal to clear doubts.

You will be able to:

  • Think and behave like an advanced, real world threat actor
  • Identify and exploit complex vulnerabilities and security misconfigurations in AWS, Microsoft Azure
  • Design your penetration tests around real-world attacker behaviors and tooling, making it relevant to the threats facing your organization
  • Identify the attack surface exposure created by cloud-based services such as virtual machines (VMs), buckets, container as a service (CaaS) platforms, and serverless functions

2 day Course

Live, online available

Hack-Lab available


Course Overview

Whether you are an Architect, Cloud Administrator, Developer, Pentester, Security Team Leader, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and how to protect yourself from them, is critical. The syllabus has been designed to cover the latest vulnerabilities and advances in hacking, as well as the skills to penetration test cloud systems and environments and remediate vulnerabilities.

Prior pentest/security experience is not a strict requirement, however, basic to intermediate knowledge of cybersecurity and familiarity with common Unix command-line syntax will be beneficial.



1. Our courses are available directly from us; through our training partners or at worldwide technical conferences.

2. You can find course dates and prices on the Courses and Webinars page.
Click here for course dates, prices and content

3. Take a look below at a few of the upcoming courses for this specific training.

4. For more information including private course requests, complete the short form below.

Courses and webinars

Booking enquiries

Select the course from the Courses and Webinars Page.

Click here for course dates and prices

For private course delivery enquiries or other information, please use the form alongside.

What you'll be doing:

  • Spending most of the session (~70%) on lab-based exercises
  • Using lab-based flows to explore and hack lifelike cloud environments
  • Exploiting different cloud and container environments
  • Competing in a Capture the Flag (CTF) challenge to test your new skills
  • Discussing case studies with your course leader to understand the real-world impact of the hacks covered

What you can take away from the course:

Our own customized version of kali linux with inhouse developed scripts and tools to help with hacking auditing and securing Cloud.

Details of the course content:


  • Introduction to cloud and why cloud security matters
  • Comparison with conventional security models
  • Shared responsibility model
  • Legalities around Cloud Pentesting
  • Attacking Cloud Services


  • DNS based enumeration
  • OSINT techniques for cloud-based asset
  • Username enumeration


  • Serverless-based attacks (AWS Lambda)
  • PaaS attack: server-side request forgery (SSRF Exploitation over AWS ElasticBeanStalk)
  • Attacking AWS Incognito misconfiguration


  • Exploring files in storage
  • Exploring shared access signatures (SAS) URLs in MS Azure
  • Exploit misconfigured storage service


  • Introduction to MS Azure
  • MS Azure application attacks (App Service, Function App, Enterprise Apps)
  • MS Azure service exploitation (Database, Key Vault, Automation account)
  • Abuse MS Azure Service Principle Misconfiguration
  • MS Azure AD or Entra ID Authentication Methods


  • AWS IAM policies and roles
  • IAM policy evaluation
  • Roles and permissions-based attacks
  • Shadow admin attacks


  • Persistence in Cloud
  • Post exploit enumeration


  • Understanding how container technology works (namespaces, cgroup, chroot)
  • From Docker to K8S
  • Identifying vulnerabilities in Docker images
  • Exploiting misconfigured containers
  • Exploiting Docker environments and breaking out of containers
  • Exploring K8S environments
  • K8S exploitation and breakouts
  • Pivoting to host OS


  • A timed competition to test your new skills and reinforce everything you’ve learnt


Who Should Take This Class?

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Pen Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level.

Prior pen testing experience is not a strict requirement, however, some knowledge of Cloud Services and common command line syntax will be greatly beneficial.

You will need:

Delegates must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicated for the VM.

Hacking Cloud Infrastructure

Course Information

You can download a copy of the course information below.

In addition you will also be provided with a student pack, handouts and cheat-sheets if appropriate.

Download the course information

Your Training Roadmap

Offensive Classes

Hacking training for all levels: new to advanced. Ideal for those preparing for certifications such as CREST CCT (ICE), CREST CCT (ACE), CHECK (CTL), TIGER SST as well as infrastructure / web application penetration testers wishing to add to their existing skill set.

Defensive Classes

Giving you the skills needed to get ahead and secure your business by design. We specialise in application security (both secure coding and building security testing into your software development lifecycle) and cloud security. Build security capability into your teams enabling you to move fast and stay secure.


Very impressed with the lab environment. Course is packed with Information and exciting challenges. Excellent Content and in-depth presentation. Loved the practice timing and walk-through. The extended lab access is helpful to practice after the class."

Delegate, Black Hat USA


Delegate, Hacking and Securing Cloud - Public Course

I really appreciated being able to take my own time over the material in the lab."

Delegate, Hacking and Securing Cloud - Public Course

It was a full 2 days and quite fast! I'm really keen to know more now."

Delegate, Hacking and Securing Cloud - Public Course

It provided me with the latest Information Security research & development."

Delegate, Black Hat USA

The training was fantastic, I'm sure I'll do the related webinars as well when I have the chance."

Delegate, Hacking and Securing Cloud - Public Course