How to Build a Penetration Testing Lab in the Cloud

Learn how to build a pen testing environment in the cloud using both manual and infrastructure as code methods

Ratings 3.00 / 5.00
How to Build a Penetration Testing Lab in the Cloud

What You Will Learn!

  • Learn infrastructure as code
  • Learn how to build a penetration testing environment in Azure
  • Learn Cloud Security concepts and terminology
  • Develop Security Engineering skills
  • Increase Terraform awareness and knowledge
  • Experience designing infrastructure
  • Develop Security Architecture skills

Description

The Building your penetration testing lab in the cloud course takes you from little or no knowledge and shows you how to build your own red team testing environment in the cloud with practical demonstrations.  You will learn the principles of building environments in a practical way using minimal lectures and focusing on step by step demonstrations.  There are very few courses like this that get straight into the practicalities of cloud security.  With this capability, you will be able to provide professional and consistent service to your company or clients.  You will learn to build manually and also using infrastructure as code.

This is a fast-growing area, specialist cloud skills in security are in high demand and using the skills here will enable your career, giving you experience in Azure.  If you are a beginner, this course is for you as it will give you the foundations in a practical way, not theoretical.  If you are an experienced security practitioner you may have focused on the other cloud providers and you are now becoming aware of conducting assessments using other cloud environments, this course is absolutely essential for you.  Some of the key areas you will learn are:

  • Cloud security principles

  • Building pentest environments in Azure

  • Secure Networking, protecting the traffic from threats

  • Automated deployment of resources

  • Infrastructure as code using Terraform

This course will give you the grounding you need to help you learn, retain and replicate the skills necessary to build red team capabilities from the cloud.  The lectures are to the point and concise because your time, like many practitioners, is precious.  All demos can be followed using your own cloud accounts and replayed time and again as your one-stop security reference. 

Who Should Attend!

  • All levels in cyber security from awareness through to practical implementation levels
  • Security professionals
  • Web application testing professionals
  • Penetration testing professionals
  • Security Engineering professionals
  • Security Managers
  • Security Architect professionals
  • SOC Analysts

TAKE THIS COURSE

Tags

  • Cyber Security
  • Cloud Security
  • Infrastructure as Code

Subscribers

17

Lectures

11

TAKE THIS COURSE



Related Courses