In this course, you will:

- Exploit serverless (e.g. Lambda, Azure Functions) applications for initial access into targets.
- Pivot between data and control planes to expand access (e.g. secrets, snapshots)
- Evade and disrupt cloud logging platforms (e.g. CloudTrail) to remain undetected.
- Breach and backdoor boundaries (e.g. VPCs) to access hard to reach systems.
- Expanding access within Kubernetes (K8s) envs (e.g. GCP bypass of metadata protections)



Other Classes We Offer
Let S2 show you what's possible
You deserve an expert security partner not just another service provider
- Decades of experience securing Federal Enterprises and Fortune 50
- Former NSA Operators skilled in the Adversary arts
- Full scope Security-as-a-Service. Press the easy button.