

Attacking and Defending Azure Lab Objective:
More than 95 percent of Fortune 500 use Azure today! A huge number of organizations now use Azure AD as an Identity and Access Management platform using the hybrid cloud model. This makes it imperative to understand the risks associated with Azure as it contains an enterprises infrastructure, apps, identities and a lot more!
In addition to cloud-only identity, the ability to connect on-prem Active Directory, applications and infrastructure to Azure AD brings some very interesting opportunities and risks too. Often complex to understand, this setup of components, infrastructure and identity is a security challenge.

This hands-on training aims towards abusing Azure, Azure AD and a number of services offered by it. We will cover multiple complex attack lifecycles against a lab containing multiple live Azure tenants.
All the phases of Azure red teaming and pentesting – Discovery, Initial access, Enumeration, Privilege Escalation, Lateral Movement, Persistence and Data mining are covered. We will also discuss detecting and monitoring for the techniques we use.
The course is a mixture of fun, demos, exercises, hands-on and lecture. The training focuses more on methodology and techniques than tools.
If you are a security professional trying to improve your skills in Azure cloud security, Azure Pentesting or Red teaming the Azure cloud this is the right class for you!
The course comes with 15+ hours of video course, slides, lab manuals, kill chain diagrams, threat-matrix diagrams and walk-through videos.
What's Included

-
Access to a lab environment (One/Two/Three months) with live Azure environment. Lab can be accessed using a web browser or VPN.
-
15+ hours of video course
-
Course slides
-
Lab manual
-
Kill chain and Threat Matrix diagrams
-
Walk-through videos
-
One Certification Exam attempt
What will you Learn?
This course helps in upskilling to one of the most coveted skill in information security – Azure security. Drawing from our experience of more than a decade to teach at hacker conferences, this hands-on course helps someone in improving their Azure security skills. The course lab is designed in a way that students can solve it in multiple ways! The lab also includes a CTF for those students who would like more challenge.

This course helps in upskilling to one of the most coveted skill in information security – Azure security. Drawing from our experience of more than a decade to teach at hacker conferences, this hands-on course helps someone in improving their Azure security skills. The course lab is designed in a way that students can solve it in multiple ways! The lab also includes a CTF for those students who would like more challenge.
-
The course lab runs on a live Azure environment. Therefore, whatever you learn in the lab is immediately applicable to your job.
-
Practice attacks on Azure in a unique live lab environment that has multiple Azure tenants and a large number of different resources including hybrid identity and on-prem infrastructure.
-
There are 4 independent ‘Kill Chains’ and 1 CTF included in the lab environment! Students can play for hours and solve the lab with different approaches.
-
The lab has User simulations for practicing Illicit Consent Grant and other phishing attacks.
-
The focus of the course and lab is abuse of features. This means that whatever you learn in the course would have a very long shelf life.
-
Understand Azure security concepts and apply them in a unique lab environment.
-
Understand the defenses available to counter the discussed attacks and analyze the footprints of the attackers!
Student Pre-requisites
Basic understanding of Azure is desired but not mandatory.