InfoSec Cloud Penetration Testing boot camp course
Advance your career in the field of cybersecurity by learning how to perform penetration testing on cloud services and applications.
This boot camp goes in-depth into the tools and techniques used to exploit and defend cloud infrastructure components with a combination of hands-on labs and expert instruction.
› Course objectives:
› Infosec’s Cloud Penetration Testing Boot Camp is a practical, handson training focused on teaching you the skills, tools and techniques required for conducting comprehensive security tests of cloud servers and applications.
› This boot camp course focuses on teaching you the key cloud penetration testing skills;
› Learn – the secrets of cloud penetration testing in an immersive environment, including AWS and Azure
› Build Tools Your pentesting toolbox in the cloud
› Deep Dive into security features and vulnerabilities of cloud infrastructure
› CCPT Certification path: The boot camp also prepares you to earn the Certified Cloud Penetration Tester (CCPT) certification
› Contact us for course brochure.
› The skills learnt help with following cybersecurity job roles;
» Penetration testers
» Red team members and other white hats
» Incident-response team members
» Security analysts
» Security consultants
» Cloud and system administrators
» Application developers
» DevSecOps engineers
After attending the Cloud Penetration Testing boot camp course, you will have the knowledge and skills to:
» Cloud pentesting process and requirements
» Attacking AWS and Azure
» Attacking containerized and serverless applications
» 100% Satisfaction Guarantee
» CCPT exam voucher
» Unlimited CCPT practice exam attempts
» Five days of live, expert CCPT instruction
» Immediate access to Infosec Skills from the minute you enroll to one year after your boot camp
» Learn by doing with 100s of additional hands-on courses and labs
» 1-year access to all boot camp video replays and materials
» Knowledge Transfer Guarantee
Pre-requisites:
» Understanding of fundamental cloud platforms (AWS, Azure)
» Working knowledge of networking devices and protocols
» Exposure to pentesting and network monitoring tools and methodologies
» Basic knowledge of Linux and Windows command line
» Familiarity with cloud and penetration testing concepts and at least one year in an information security role, or
equivalent experience, is recommended.
» We recommend taking out Cybersecurity Foundation Course, 30 days before starting cybersecurity bootcamp course.
› The course is available in 3 delivery methods;
- Online
- In person
- Team Onsite (for North America, Canada/USA only)
› Infosec instructors have at least 10 years of industry training experience and are professionals with active roles in the
industry.
› Come learn from industry experienced instructors!
› OPTION #1: Online bootcamp dates:
Feb 14 – Feb 18
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Mar 21 – Mar 25
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
April 18 – Mar 22
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Jul 11 – Jul 15
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Aug 8 – Aug 12
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
› OPTION #1: Online bootcamp dates:
Nov 28 – Dec 2
› Contact us for seat availability for selected date
› Custom course: We will mutually discuss a custom course schedule to fit your business required dates.
› Custom delivery: Virtual class room. In-person class is available. Travel costs will be extra.
Contact us for details.
Corporate:
If you have a larger team needing training, please contact us for a custom quote.
Custom schedule dates are available.
Contact us for details.
Individuals:
- Live instructor online bootcamp – $2500 usd
Contact us to Enroll
Achieving the Cloud Penetration Testing Certification Credential
After completing this course, you’ll be ready to take the CCPT certification exam.
Cyber Threat Hunting boot camp course – Key Features
› Exam Pass Guarantee (live online): 1 re-take is free, if you don’t pass on 1st attempt
› Certified Cloud Penetration Tester (CCPT) exam voucher: included
› Unlimited CCPT practice exam attempts: included
› Cloud Penetration Testing boot camp course: 5-day live instructor boot camp course (online or in-person)
› InfoSec skills boot camp course: Immediate access to Infosec Skills from the minute you enroll to one year after your boot
camp
› 100% Satisfaction Guarantee
› Hands-on labs: Learn by doing with 100s of additional hands-on courses and labs.
› 1-year access: 365-day access to all boot camp video replays and materials
› Knowledge Transfer Guarantee: If an employee leaves within three months of obtaining certification, Infosec will train a different employee for free for up to one year
Cloud Penetration Testing boot camp – course topics
Cloud pentesting process and requirements
» The need for cloud pentesting
» Cloud architecture fundamentals
» Cloud security responsibilities (within service models)
» Unique challenges for cloud pentesting
» Multi-tenancy considerations (data privacy, legal requirements, rules of engagement)
» Cloud attack surface
» Virtualization concepts
» Pentesting methodologies
» Cloud pentesting process
» Pentesting tools: traditional and cloud-specific
» Setting up a cloud pentesting environment
Reconnaissance in the cloud
» OSINT techniques
» Azure and AWS IP ranges
» Tools for obtaining IP and host information (Shodan, Censys, Google dorks)
» Enumerating access with Nimbostratus, ScoutSuite and Prowler
» Finding exposed buckets
» Bucket enumeration with Slurp
» Service discovery
Attacking AWS
» AWS security features
» AWS Console overview
» Working with AWS CLI
» Exploiting remote access protocols (SSH , RDP)
» Exploiting application security misconfigurations
» Abusing EC2 metadata
» Stealing IAM credentials
» EC2 IMDSv2
» Attacking lambda endpoints
» Assessments with AWS Inspector
» Attacking misconfigured S3 buckets
» Discovering and stealing EBS snapshots
» Recovering data from EBS snapshots
» Exploiting AWS RDS misconfigurations
» RDS data pilfering with AWS CLI and Amazon API
» Persistence
Attacking Azure
» Understanding Azure Services
» Mapping Azure Services to AWS Services
» Attacking Azure Virtual Machines
» Attacking Azure Blob Storage misconfigurations
» Extracting data from disk snapshots
» Subdomain takeover via Azure App Services
» Gaining shell access with Azure run command
» Finding and examining Azure SQL Database servers
Attacking containerized and serverless applications
» Understanding containers
» Working with Docker
» Container breakout
» Exploiting misconfigured containers
» Trojanized Docker images
» Understanding Kubernetes
» Attacking deployed applications
» Attacking Kubernetes clusters
» Understanding AWS Lambda
» Attacking serverless applications
Reporting
» Cloud security frameworks and best practices
» Collecting and reporting evidence in cloud accounts, aliases, metadata, keys and AMIs
» Developing and communicating follow-up items
Cloud Penetration Testing boot camp course enrollment
Learning Method: Self paced online, In-person, Team on-site
$4500 USD
Where do you from here?
You’re on a great start with Cloud Pentest certification. Where do you go from here?
Next in the training path are specialization courses are;
» Ethical Hacking and PenTest+ boot camp (CEH and PenTest+ certification)
» Advanced Pentests 10-day training
» Incident Response and Network Forensics boot camp course
» Cyber Threat Hunting boot camp
InfoSec Accredited Training Partner
We’re and Authorised and Accredited InfoSec Training Partner. We specialize in providing InfoSec cybersecurity skills development and InfoSec Security Awareness Training for Corporations and Individuals
Error: Contact form not found.