Talk With an Expert
Major updates

SEC588: Cloud Penetration Testing

SEC588Offensive Operations
  • 6 Days (Instructor-Led)
  • 36 Hours (Self-Paced)
Course authored by:
Moses FrostAaron Cure
Moses Frost & Aaron Cure
SEC588: Cloud Penetration Testing
Course authored by:
Moses FrostAaron Cure
Moses Frost & Aaron Cure
  • GIAC Cloud Penetration Tester (GCPN)
  • 36 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • 24 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Cloud security starts with thinking like the adversary—hack, test, and assess cloud environments built from real-world attacks.

Course Overview

SEC588 is a specialized course that focuses on penetration testing in Cloud environments. The course itself is part of both the Offensive Operations and Cloud Curricula. It equips Penetration Testers, Red Team Operators, Cloud Practitioners, Cloud Architects, and those involved in incident response with the tools to assess and operate in various cloud environments. The course features AWS, Azure, Microsoft 365, and Kubernetes to provide students with hands-on experience across the broadest range of environments, ensuring comprehensive coverage. Apply offense and defense capabilities in the cloud immediately.

What You'll Learn

  • Conduct end-to-end IaaS, PaaS, and SaaS Penetration Testing Scenarios
  • Learn modern attack techniques in real-world ranges
  • Build a methodology to assess weaknesses in Cloud Environments
  • Modern attacks on Microsoft and AWS Environments
  • Use Modern C2 Toolsets to move laterally in Cloud Environments

Business Takeaways

  • Comprehensive risk analysis on Modern Cloud environments
  • Enhanced security posture by learning offensive techniques on cloud and SaaS systems
  • Scalable testing methodologies to tackle the most modern datacenters
  • Learn to examine critical business assets
  • Build a transferable offensive skillset

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in SEC588: Cloud Penetration Testing.

Section 1Architecture, Discovery, and Recon at Scale

How do clouds work? How do the offensive teams operate in these environments? What are the limits of testing? How do we scan for vulnerabilities externally and internally in a safe manner? The first section of the course is designed to help the student begin their Cloud Assessment journey.

Topics covered

  • Cloud Architectures for Scoping a Test
  • External Network Discovery Using The Asset Discovery Pipeline
  • Internal Cloud Vulnerability Scanning
  • Cloud Authentication Overview

Labs

  • Course Overview Immersion Lab
  • External Attack Surface Discovery
  • Internal Cloud Enumerations
  • Hawkins Research Lab Scavenger Hunt

Section 2Attacking Identity Systems

While Section One covered the mechanisms for starting and evaluating an environment, Section Two deals with a core component of the cloud. Identity Systems are core to most cloud environments, so we dedicate a whole section to evaluating them. This includes a comprehensive evaluation of Microsoft Entra ID and its key strengths.

Topics covered

  • Authentication Standards
  • Microsoft Cloud Services and Entra ID
  • Malicious App Consents
  • Microsoft Graph
  • File Storage Attacks

Labs

  • Single Factor Authentications
  • Working with Authentication Attacks Tools
  • Microsoft Graph and Malicious App Consents
  • Hunting for Unauthenticated File Shares

Section 3Attacking and Abusing Cloud Services

In Section 3, students will attack the cloud infrastructure assets. Students will learn how to leverage these assets to navigate cloud environments further, elevate privileges, and persist. Cloud Infrastructures can be highly complex, and in that complexity, the students will learn how to navigate and assess the risk each attack path poses.

Topics covered

  • Compute Attack Scenarios
  • AWS IAM and Privilege Escalations
  • Using AWS Attack Tools and C2
  • Azure Compute
  • Code Execution in Azure

Labs

  • AWS End-to-End Attack Lab
  • AssumeRole and Confused Deputy
  • Azure VMs
  • Running Commands on Azure and Azure Managed VMs

Section 4Vulnerabilities in Cloud Native Applications

Section 4 will walk the students through workloads in the cloud. Applications in the cloud are one of the most common workloads in the cloud, beyond internal data center migration. One of the key features of many of these applications is their cloud-integrated nature. Learning how to assess these systems will be crucial during assessment work.

Topics covered

  • Infrastructure as Code and CI/CD Attacks
  • Web Applications and API Attacks
  • Common Web Attack Paths
  • Attacking Serverless Functions
  • Databases, Datalakes, and LLMs

Labs

  • Terraform and CI/CD Hijacking
  • SSRF and RCE Attacks
  • Serverless Functions
  • Database Attacks

Section 5Infrastructure Attacks and Red Teaming

Section 5 provides the student with an overview of infrastructure core components that are cloud-agnostic. Containers comprise a significant portion of cloud workloads. This section provides students with a methodology for assessing container and container workloads. The section concludes with an assessment of work on Kubernetes.

Topics covered

  • Red Team Operations in the Cloud
  • Containers, Docker, and Docker Vulnerabilities
  • Kubernetes
  • Backdooring Workloads

Labs

  • Intro to Containers
  • Breaking out of Container Environments
  • Pivoting through Container Workloads
  • Kubernetes Assessments
  • Persistence and Pivoting in Kubernetes

Section 6Capstone Event

In a final capstone event, we demonstrate cloud penetration testing's unique demands and the specialized expertise required to go beyond traditional security assessments. Students collaboratively bring their new knowledge to bear on a simulated end-to-end test, reinforcing theory and practice and producing an effective, readable report.

Things You Need To Know

Relevant Job Roles

Threat Detection & Response

Cloud Security

Monitor, test, detect, and investigate threats to cloud environments.

Explore learning path

Vulnerability Assessment

SCyWF: Protection And Defense

This role tests IT systems and networks and assesses their threats and vulnerabilities. Find the SANS courses that map to the Vulnerability Assessment SCyWF Work Role.

Explore learning path

Vulnerability Analysis (OPM 541)

NICE: Protection and Defense

Responsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.

Explore learning path

Application Pen Tester

Offensive Operations

Application penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.

Explore learning path

Cyber Operations Planner (DCWF 332)

DoD 8140: Cyber Effects

Coordinates cyber operations plans, working with analysts and operators to support targeting and synchronization of actions in cyberspace.

Explore learning path

Penetration Tester

European Cybersecurity Skills Framework

Assess the effectiveness of security controls, reveals and utilise cybersecurity vulnerabilities, assessing their criticality if exploited by threat actors.

Explore learning path

Systems Testing and Evaluation (OPM 671)

NICE: Design and Development

Responsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
  • Location & instructor

    Virtual (OnDemand)

    Instructed by
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,230 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    ¥1,335,000 JPY*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Rockville, MD, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Orlando, FL, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    San Diego, CA, US & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,230 EUR*Prices exclude applicable local taxes
    Registration Options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Date & Time
    Fetching schedule..View event details
    Course price
    $8,780 USD*Prices exclude applicable local taxes
    Registration Options
Showing 10 of 12

Benefits of Learning with SANS

Instructor teaching to a class

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Resources

Get access to our range of industry-leading courses and resources