Hacking and Securing Cloud Infrastructure

Hacking and Securing Cloud Infrastructure

Actions and Detail Panel

From £1,500

Date and time


Online event

Refund policy

Contact the organiser to request a refund.

Eventbrite's fee is nonrefundable.

Bring your technical cybersecurity skills up to the industry standard by training with our experienced, practicing penetration testers.

About this event

This 4-day course cuts through the mystery of Cloud Services (including AWS, Azure, and Google Cloud Platform) to uncover the vulnerabilities that lie beneath. We will cover a number of popular services and delve into both what makes them different, and what makes them the same, as compared to hacking and securing traditional network infrastructure.

Whether you are an Architect, Developer, Pentester, Security or DevOps Engineer, or anyone with a need to understand and manage vulnerabilities in a Cloud environment, understanding relevant hacking techniques, and knowing how to protect yourself from them is critical. This course covers both the theory as well as a number of modern techniques that may be used to compromise various Cloud services and infrastructure.

Prior pentest/security experience is not a strict requirement, however, some knowledge of Cloud Services and familiarity with common Unix command-line syntax will be beneficial.

What's the real impact of training your team through NotSoSecure?

Uncover and harden your organisation’s cloud attack surface by building a team that can test, identify, and guide developers to remediate – and further avoid – the emergence of cloud-based vulnerabilities and misconfigurations. Trained delegates can:

  • Perform testing to identify and safely exploit complex vulnerabilities and security misconfigurations in AWS, Microsoft Azure, and Google Cloud Platform (GCP)
  • Design this testing around real-world attacker behaviour and tooling, making it relevant to the threats facing your organisation
  • Identify the attack surface exposure created by cloud-based services such as virtual machines (VMs), buckets, container as a service (CaaS) platforms, and serverless functions
  • Exploit, defend, and audit containerisation environments
  • Collaboratively plan cloud defence strategies that include patching, asset inventory management, and other security controls
  • Recommend and help implement cloud-based attack detection and response tactics
  • Understand the business impact of cloud misconfigurations and vulnerabilities, and articulate this to key stakeholders
  • Contribute to a secure cloud roadmap by understanding the balance between cloud growth and risk and the implications of different cloud architecture models
  • Take on greater responsibility in the team and become an advocate of security in the wider business

Who Should Take This Class?

Cloud Administrators, Developers, Solutions Architects, DevOps Engineers, SOC Analysts, Penetration Testers, Network Engineers, security enthusiasts and anyone who wants to take their skills to next level.

Prior Pen Test experience is not a strict requirement, however, some knowledge of Cloud Services and a familiarity with common command line syntax will be greatly beneficial.

Student Requirements

Delegates must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicated for the VM.

What will this course cover?

To view the full course outline please click here


Refunds available if notice is given before at least 7 days before the event date

Share with friends