Register$3,899.00
Date | Day | Time | Duration |
26 Aug | Monday | 0900-17:00 ICT/GMT+7 | 8 Hours |
27 Aug | Tuesday | 0900-17:00 ICT/GMT+7 | 8 Hours |
28 Aug | Wednesday | 0900-17:00 ICT/GMT+7 | 8 Hours |
Recent surveys showed that Azure adoption has sneaked past AWS. Yet, expertise in assessing, securing and managing Azure still suffers from a big shortage. Making experts in the domain sought after and well paid.
With over 200 services on offer, Microsoft Azure presents a challenge for both teams on the offensive side and defensive side. While both teams trying to keep up with the ever-evolving services and features, misconfigurations are introduced in abundance allowing for ethical hacker and threat actors alike to take advantage of them.
In this course we introduce some of the most common Azure services used, how they are often misconfigured, abused and how they could be better secured.
The course covers two angles, the threat actor perspective, methods, and techniques. And how to monitor, detect and defend.
This training is designed to be beginner friendly. Although it helps, you do not need prior experience in Azure. The training is built for cloud administrators, architects, penetration testers and defenders to help you understand the most used Microsoft Azure services, how they are misconfigured and abused and how you can monitor and secure them.
Keeping a balance between theory and practice, you will quickly get your hands dirty both with Azure services and multiple attack tools and techniques while targeting our live lab environment.
Designed to replicate real-life misconfigurations, you will gain a solid understanding of a typical setup, the most used Microsoft Azure services, how they are misconfigured and abused. In parallel, you will also work on setting up proper monitoring and logging in addition to securely configuring these services.
You will explore multiple attack techniques that are being used by APTs to target Azure. Many of which resulted in breaches you heard of and read about in the news.
You will follow different attacks paths and multiple ways for initial access, persistence, and privilege escalation. You will also work on auditing, monitoring and secure these services.
Some of the topics covered will include: