In this course, you will:

  • Exploit serverless (e.g. Lambda, Azure Functions) applications for initial access into targets.
  • Pivot between data and control planes to expand access (e.g. secrets, snapshots)
  • Evade and disrupt cloud logging platforms (e.g. CloudTrail) to remain undetected.
  • Breach and backdoor boundaries (e.g. VPCs) to access hard to reach systems.
  • Expanding access within Kubernetes (K8s) envs (e.g. GCP bypass of metadata protections)

Other Classes We Offer

Let S2 show you what's possible

You deserve an expert security partner not just another service provider

  • Decades of experience securing Federal Enterprises and Fortune 50
  • Former NSA Operators skilled in the Adversary arts
  • Full scope Security-as-a-Service. Press the easy button.

Know your IMMINENT RISK

  • Please select a service offering in which you are interested in learning more.
  • This field is for validation purposes and should be left unchanged.