● HANDS-ON WORKSHOP
Discover defensive and offensive strategies for Cloud Least Privilege, Key Management, and Secure CI/CD in an intensive 2-day hands-on cloud security workshop.
Cyber Helmets and HackTricks Training are collaborating to develop and deliver an exclusive online hands-on cloud security workshop, focused on applying least-privilege at scale, securing key-management operations, and preventing common cloud-pivoting techniques across Cloud (AWS, Azure, and GCP.), Kubernetes and CI/CD pipelines.
● WHAT YOU’LL DO
Review how IAM works across AWS, Azure, and GCP, and understand why the lack of least-privilege configurations remains the most common cloud security issue.
Learn how to use modern and novel tools to design, validate, and enforce least-privilege configurations in AWS IAM, Azure RBAC, and GCP IAM.
Explore how Key Management Services operate across cloud providers and learn how to secure encryption keys against misuse, abuse, and privilege escalation.
Analyze real-world cloud attacks involving credential abuse and secret exposure, and replicate defensive techniques in a controlled environment.
Harden CI/CD pipelines to prevent unauthorized deployments, supply-chain attacks, and credential leakage across build and deployment workflows.
Understand pivoting techniques used in compromised cloud environments and apply security controls to Amazon EKS and Kubernetes clusters to prevent lateral movement and privilege escalation.
● AGENDA
Multi-Cloud IAM Hardening
→ Least-privilege principles
→ Permission boundaries, service accounts, and role-based access
→ Common IAM anti-patterns and how to fix them
Secure Key Management
→ How AWS KMS, Azure Key Vault, and GCP Cloud KMS work
→ Preventing key misuse and enforcing separation of duties
→ Monitoring and auditing key-management activities
Secure CI/CD and Supply-Chain Defense
→ Locking down secrets, roles, and pipeline permissions
→ Preventing unauthorized pipeline execution and image tampering
Kubernetes & EKS Security
→ Understanding cloud pivoting risks in compromised clusters
→ Hardening nodes, IAM roles, and network boundaries
→ Implementing detection for lateral movement patterns
Final Assessment – Recap & Hands-On Lab
● INSTRUCTORS

Security researcher, telecommunications engineer and creator of HackTricks with extensive experience in penetration testing, red teaming and cloud security tools.

Cloud security engineer and co-founder of HackTricks Training, currently working as a cloud security expert with DevSecOps experience.
● WHAT YOU’LL GAIN
● REQUIREMENTS & PREREQUISITES
● BOOK YOUR SEAT
Join Cyber Helmets & HackTricks Training for an intensive two-day, hands-on workshop on cloud security.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup