Cloud Penetration Testing with Azure - Master Initial Access
What you'll learn
- Set up and utilize phishing frameworks to bypass MFA
- Implement device code phishing techniques
- Create a pentesting lab for blob hunting
- Identify domain names using different methods and tools
- Understand Microsoft Entra ID and conduct reconnaissance from an outsider's perspective
- Explore user enumeration techniques and Azure permissions in detai
- Learn to protect against initial access threats
- Implement conditional access policies
- Safeguard cloud environments
- Engage in practical labs and exercises to apply learned techniques
- Utilize a variety of tools, including AAD Internals, O365Spray, EvilGinx, GraphSpy, and more.
- Set up and exploit cloud environments to gain practical hacking experience
- Modify and adapt techniques to launch powerful attacks in diverse scenarios.
- Build a strong foundation in ethical hacking and penetration testing, specifically for Azure environments.
- Analyze and exploit Azure Cloud
Requirements
- Interest in Cybersecurity
- Willingness to Learn
- Basic Understanding of Networking
Description
Welcome to "Cloud Penetration Testing with Azure - Master Initial Access," your ultimate guide to mastering cloud-specific penetration testing and ethical hacking in Microsoft Azure. Designed for all skill levels, this course combines comprehensive theoretical knowledge with hands-on practical exercises to enhance your cloud security expertise with NO prior cloud knowledge required.
This course is ideal for both beginners and experienced cybersecurity professionals looking to deepen their knowledge and skills in cloud security.
We begin by setting up your pentesting lab environment using FREE Microsoft 365 and Azure subscriptions. You'll secure admin accounts, configure Entra ID user accounts, and leverage tools like AAD Internals for effective reconnaissance and target identification.
Our focus then shifts to mastering initial access techniques within Azure environments. You'll master methods such as brute force attacks, password spraying, and sophisticated phishing strategies using tools like EvilGinx and GraphSpy.
You will exploit Azure cloud storage by setting up a pentesting lab for blob hunting, using tools like MicroBurst and ForexBuster to perform predictable resource location attacks.
Throughout the course, you'll use a variety of powerful tools, including PowerShell scripts to setup lab for penetration testing.
You will learn how to use following tools:
AAD Internals
O365Spray
Evilginx
GraphSpy
MicroBurst
FeroxBuster
and more...
The practical approach ensures you can apply your skills directly to Azure environments.
By the end of this course, you'll have a solid foundation in cloud penetration testing, equipping you with the knowledge and tools to detect, prevent, and secure cloud environment effectively.
Who this course is for:
- Cybersecurity Architects
- Penetration Testers
- Cybersecurity Professionals
- Cloud Architects
- Cloud Security Engineers
- Ethical Hackers
- Anybody interested in Cloud Security
- Anyone interested in Ethical Hacking
Instructor
I'm a cybersecurity architect with 8 certifications working for a company with a close partnership with Microsoft. My expertise is Microsoft Sentinel (cloud native SIEM and SOAR platform), including designing, implementing, optimizing analytics rules, workbooks, playbooks, automation rules and data ingestion. Furthermore my focus is on Microsoft Defender for Cloud to create a secure and scalable business environment in the cloud.
My goal was always to be one of the best in my field and later to pass the knowledge among the others to help people succeed with their goals. I hope you find my content useful and if you have any question, please don't hesitate to contact me.