SEC504: Hacker Tools, Techniques, and Incident Handling

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usConnect, learn, and share with other cybersecurity professionals
Engage, challenge, and network with fellow CISOs in this exclusive community of security leaders
Become a member for instant access to our free resources.
Sign UpMission-focused cybersecurity training for government, defense, and education
Explore industry-specific programming and customized training solutions
Sponsor a SANS event or research paper
We're here to help.
Contact UsApply your credits to renew your certifications
Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months
Course material is geared for cyber security professionals with hands-on experience
Apply what you learn with hands-on exercises and labs
Master modern cloud penetration testing in the cloud environments that dominate the market. Gain hands-on experience testing infrastructure, identity providers, containers, microservices, and more.
Meticulously designed, SEC588 balances in-depth theory with practical labs, addressing today's pivotal cloud security challenges. This course is indispensable for security professionals seeking cutting-edge knowledge.
SEC588: Cloud Penetration Testing provides comprehensive training empowering security professionals to effectively assess modern cloud environments. The course bridges the gap between traditional penetration testing and cloud-specific challenges, covering critical areas like microservices, serverless functions, and Kubernetes deployments. Students will address unique cloud security challenges including service plane vulnerabilities, shared hosting environments, and cloud-native application assessment, learning practical techniques for testing both AWS and Azure environments, which dominate the market. Whether you are a seasoned penetration tester expanding into cloud or a cloud security professional, the course delivers hands-on experience with modern attack vectors and risk assessment methodologies.
Aaron is a Senior Security Consultant at Cypress Data Defense and teaches SANS SEC542: Web App Penetration Testing and Ethical Hacking, and SEC588: Cloud Penetration Testing.
Read more about Aaron CureMoses has built an impressive career as a Network Architect, DevOps Engineer, and Information Security professional. Today, he works in the Offensive Operations space as a Red Team Operator and serves as the course author for SEC588.
Read more about Moses FrostExplore the course syllabus below to view the full range of topics covered in SEC588: Cloud Penetration Testing.
Cloud penetration testing begins with reconnaissance and discovery. You will understand service provider boundaries, perform internet-scale scanning, and implement asset discovery pipelines, exploring methods for target infrastructure identification, vulnerability discovery, and large-scale reconnaissance strategies that adapt to web-scale environments.
Students assess authentication mechanisms' inherent vulnerabilities, gaining practical experience testing OAuth and OpenIDConnect, discovering authentication bypasses, and executing attacks like app consent phishing. Comprehensive labs emphasize real-world scenarios, covering Microsoft Graph exploitation and identity systems across major cloud platforms.
Advanced privilege escalation and lateral movement techniques are the core of cloud infrastructure testing. Hands-on exercises in AWS and Azure teach students to compromise compute resources and navigate between control and data planes while bypassing common security controls, emphasizing practical exploitation of administrative features and developer tools.
Modern application security testing requires specialized knowledge of serverless functions and container-based microservices. Students explore advanced testing for CI/CD pipelines, infrastructure as code, and cloud-specific injection attacks, engaging in practical exploitation scenarios and understanding complex attack chains in cloud-native environments.
Container breakout techniques and service mesh exploitation provide the foundation for advanced cloud-based operations. Students explore data exfiltration methods and strategies for building attack infrastructure within cloud environments. Labs focus on real-world scenarios, including Kubernetes cluster exploitation and sophisticated evasion techniques.
In a final capstone event, we demonstrate cloud penetration testing's unique demands and the specialized expertise required to go beyond traditional security assessments. Students collaboratively bring their new knowledge to bear on a simulated end-to-end test, reinforcing theory and practice and producing an effective, readable report.
Monitor, test, detect, and investigate threats to cloud environments.
Explore learning pathResponsible for conducting independent comprehensive assessments of management, operational, and technical security controls and control enhancements employed within or inherited by a system to determine their overall effectiveness.
Explore learning pathResponsible for assessing systems and networks to identify deviations from acceptable configurations, enclave policy, or local policy. Measure effectiveness of defense-in-depth architecture against known vulnerabilities.
Explore learning pathApplication penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Explore learning pathResponsible for planning, preparing, and executing system tests; evaluating test results against specifications and requirements; and reporting test results and findings.
Explore learning pathAdd a GIAC certification attempt and receive free two practice tests. View pricing in the info icons below.
When purchasing a live instructor-led class, add an additional 4 months of online access after your course. View pricing in the info icons below.
This course perfectly complements the change in the direction of red team engagement scopes.
SANS course SEC588 taught me more than I expected. With the rapid development of new technologies offered by cloud providers, SEC588 has given me an important framework for cloud pen testing.
SEC588 taught me crucial information needed before putting data in a cloud.
Get feedback from the world’s best cybersecurity experts and instructors
Choose how you want to learn - online, on demand, or at our live in-person training events
Get access to our range of industry-leading courses and resources