Contact Sales
Contact Sales
New

SEC559: Cloud and Hybrid Identity Security

SEC559Cloud Security
  • 2 Days (Instructor-Led)
  • 12 Hours (Self-Paced)
Course authored by:
Maxim Deweerdt
Maxim Deweerdt
SEC559: Cloud and Hybrid Identity Security
Course authored by:
Maxim Deweerdt
Maxim Deweerdt
  • 12 CPEs

    Apply your credits to renew your certifications

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 8 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

SEC559 builds the skills to detect and remediate identity-driven attacks across Entra ID and hybrid Active Directory before trusted access is compromised.

Course Overview

Be First to Access SEC559

Sign up to be the first notified as new course updates and sessions roll out, including opportunities to secure a spot in upcoming discounted Beta sessions.

In today’s hybrid enterprises, identity is the new blast radius. Attackers aren’t kicking down doors, they’re slipping through misconfigured apps, leaked secrets, rogue certificates, and quietly abused OAuth flows. SEC559 hands practitioners the playbook to stop illegitimate access across cloud and hybrid identity control planes by analyzing OAuth abuse, token anomalies, service principal compromise, and federation trust failures.

What You'll Learn

  • Detect OAuth consent abuse, Graph API misuse, and refresh-token replay
  • Identify compromised service principals and leaked secrets
  • Analyze OAuth, OIDC and SAML token flows for anomalies
  • Detect and respond to federation abuse and rogue signing certificates
  • Safely remediate identity compromises through session revocation, secret rotation, and trust cleanup

Business Takeaways

  • Reduce risk from identity-based attacks that bypass traditional defenses
  • Detect attackers using “legitimate” credentials and tokens
  • Prevent tenant-wide and domain-wide compromise
  • Improve visibility across cloud and hybrid identity control planes
  • Strengthen Zero Trust and identity governance programs

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC559: Cloud and Hybrid Identity Security.

Section 1Cloud Identity Foundations, OAuth Abuse and Token Security

On Day 1, students are introduced to the modern cloud identity threat landscape through a realistic, cloud-first breach scenario.

Topics covered

  • Modern cloud identity threats and attacker patterns
  • Identity trust boundaries in Microsoft Entra ID
  • OAuth 2.0 and OpenID Connect fundamentals
  • Token anatomy, claims, and validation behavior
  • Identity telemetry in Entra ID

Labs

  • Explore OAuth Tokens and Device Code Flow
  • Hunt OAuth Consent Abuse
  • Simulate CI/CD Secret Leak & Application Takeover
  • Contain incidents with session revocation and secret rotation

Section 2Hybrid Identity Attacks, Federation Abuse and Detection Gaps

On Day 2, students dive into hybrid identity environments where Microsoft Entra ID, on-prem Active Directory, and federation services intersect. 

Topics covered

  • Hybrid identity architectures and Entra Connect trust models
  • Active Directory and Kerberos attack paths in hybrid environments
  • Mapping on-prem to cloud privilege escalation paths
  • Federation trust, SAML authentication, and abuse techniques
  • Hybrid identity detection and response strategies

Labs

  • Map hybrid identity attack paths using BloodHound
  • Enumerate federated domains and SAML trust relationships
  • Investigate hybrid attacks with Defender for Identity
  • Rotate federation certificates during active compromise

Things You Need To Know

Relevant Job Roles

Cloud Security Analyst Training, Salary, and Career Path

Cloud Security

A Cloud Security Analyst monitors and analyzes activity across cloud environments, proactively detects and assesses threats, and implements preventive controls and targeted defenses to protect critical business systems and data.

Explore learning path

Cloud Threat Detection and Response

Cloud Security

Monitor, test, detect, and investigate threats to cloud environments.

Explore learning path

We're updating our course schedule - please check back later.

Benefits of Learning with SANS

Bryan Simon: Teacher Standing Next to Smartboard and Explaining Concept

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Close Up of Woman Holding a Pen and Documents

Get access to our range of industry-leading courses and resources