This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure iOS applications.
This instructor-led training (ILT) course equips students with the knowledge and skills needed to effectively test and secure Android applications.
This instructor-led training will help you master Azure and EntraID security and apply red teaming tactics.
This instructor-led training covers the basics to expert level, helping validate your expertise in AWS security.
In partnership with:
In partnership with:
By partnering with leading platforms like Hack The Box, or collaborating with world-class instructors we have created cutting-edge, instructor-led cybersecurity courses based on industry-ready standards that are highly interactive, hands-on, and offer actionable knowledge to your team.
Purple teaming brings together the strengths of both red and blue teams to ensure your defense is as robust as it can be. Secure your infrastructure and outsmart cyber threats with a tailored strategy.
Boost your organization’s defenses with custom-designed cybersecurity training tailored to your industry standards. From beginner-level awareness to advanced threat detection and response, we develop training that meets your unique compliance requirements and security challenges.
Begin your path in Azure Security and Red Teaming.
This instructor-led training introduces you to core Azure security concepts and red teaming tactics through hands-on labs and expert guidance.
Fill in the following form and we'll notify you when registration opens.
Energize your cloud security career.
This instructor-led training from Cyber Helmets provides a strong foundation in offensive security, focusing on core principles of Azure and EntraID security, with structured guidance, expert support, and walkthroughs to help you navigate challenging concepts confidently.
Starting with fundamental concepts, you will enhance your ability to conduct effective red team engagements in Azure and EntraID environments. You’ll learn to spot and exploit common misconfigurations in Azure and EntraID services, while gaining a solid understanding of basic attack techniques, reconnaissance, and exploitation.
Through hands-on labs, you’ll gain practical experience identifying vulnerabilities, bypassing Azure-specific security controls, and applying your skills in cloud environments. This course is designed to introduce aspiring security professionals to the fundamentals of red teaming and cloud security. It will equip you with the foundational knowledge and skills required to start performing red team operations in cloud infrastructures, setting you on the path to developing a career in offensive security.
What You’ll Learn:
☁️ Azure Identity and Access Management
☁️ Azure Network Security
☁️ Azure Compute and Storage Security
☁️ Threat Protection and Security Operations
☁️ Red Teaming Tactics
Level:
Beginner to
Intermediate
Class schedule:
TBA
Duration:
2 days
(8h/day)
Start date:
TBA
Level:
Entry to intermediate
Class schedule:
TBA
Duration:
8 weeks (8h/week)
Start date:
November 18th
Ideal for:
Security Analysts and Penetration Testers
SOC Analysts and
IT professionals
System Administrators
Course syllabus:
Course led by:
Carlos Polop has a degree in Telecommunications Engineering with a Master in Cybersecurity. He has worked mainly as Penetration Tester and Red Teamer for several companies and has several relevant certifications in the field of cybersecurity such as OSCP, OSWE, CRTP, eMAPT, eWPTXv2, OSMR, ARTE, GRTE, AzRTE. He was captain of the Spanish team in the ECSC2021, member of Team Europe for the ICSC2022 and trainer of Team Europe for the ICSC2024. He has also spoken at several international conferences such as DEFCON31 and several ROOTEDCONs. Since he started learning cybersecurity he has tried to share his knowledge with the Infosec community by publishing open source tools such as PEASS and writing a free hacking book that anyone can consult at HackTricks and HackTricks Cloud
Ignacio Dominguez is a Madrid based Cloud Security Engineer. Currently working at Circle as a Cloud Security Expert and with DevSecOps experience in several startups. Ignacio loves developing CTF challenges for competitions such as NahamCon, HacktivityCon and other mayor events. Passionate about hacking CI/CD systems and Cloud Native environments. He co-founded HackTricks Training offering quality Cloud Security certifications like AWS Red Team Expert, GCP Red Team Expert and Azure Red Team Expert.
Jaime Polop began his academic journey with a degree in Telecommunications Engineering from the Universidad Politécnica de Madrid, and later deepened his expertise by earning a master’s degree in cybersecurity from KU Leuven. His strong foundation in these disciplines paved the way for his role as a Cloud Specialist at Hacktricks Training. In addition, Jaime has distinguished himself by obtaining the prestigious ARTE, GRTE and AzRTE cloud certifications, underscoring his commitment to excellence and innovation in the evolving landscape of cloud computing and cybersecurity.
> 30 day access to HackTricks’ labs and content.
> Access to 20+ hands-on labs to practice real-world attack techniques, reinforce your learning, and apply skills in a controlled environment.
> Αccess to course materials such as videos, slides, links to further reading, code snippets, lab exercises, etc.
> Certificate of completion from HackTricks
Cyber Helmets instructor-led Azure Security Specialist course offers a structured and immersive learning experience in global red teaming, combining expert guidance, walkthroughs, and support to help you build a solid foundation in offensive security.
The course provides access to hands-on labs and curated resources designed to deepen your understanding of red teaming tactics, techniques, and procedures in real-world scenarios.
Upon completion, you’ll earn a certificate from HackTricks, validating your skills and practical experience in red team operations and enhancing your career in cybersecurity.
Fill in the following form and we'll notify you when registration opens.
Accordion Content
No, prior experience with cloud technology or Azure is not required to start the AzRTA course. The curriculum is designed to familiarize you with the workings of Azure before delving into more complex topics.
The AzRTE course is a comprehensive learning experience, which begins with instructor-led guidance covering the basics of Azure. This includes an understanding of the hierarchy of Azure organizations, privilege management, and the concepts of users, resource groups, and managed identities. This will ensure that you grasp the primary structure of Azure accounts.
As you progress, you’ll learn about both fundamental (Entra ID, Key Vault, Storage, etc.) and advanced Azure services (Logic Apps, Azure Functions, Databases, etc.). You’ll understand their functions, how to enumerate them, and how to exploit them as an attacker. This learning will be facilitated through an instructor-led course that provides expert guidance and real-time support, complemented by hands-on labs to reinforce practical skills. For a comprehensive list of Azure services covered in the course, please refer to the course syllabus. With a solid understanding of Azure basics and techniques to compromise various Azure services, you’ll then explore methodologies for different scenarios:
• Whitebox Methodology: Learn the HackTricks methodology for conducting a whitebox Azure assessment. This involves performing a thorough evaluation when given read-only access to a company’s accounts—a frequently requested service among companies.
• BlackBox (Red Team) Methodology: Harness your understanding of Azure services to conduct an external assessment of a company’s Azure setup, escalating privileges wherever possible. Towards the end of the course, you’ll be introduced to common Azure detection services like Microsoft Sentinel and Microsoft Defender. Understand how these services work and learn strategies to bypass them, ensuring stealth during your Red Team assessments. You will practice these techniques in some hands-on labs.
To obtain the certification, it’s imperative to successfully clear all the hands on labs that assesses a comprehensive understanding of the Azure hacking techniques covered in this course.
While the original labs are designed to encourage self-guided exploration, Cyber Helmets instructor-led course provides structured guidance, expert support, and walkthroughs to help you navigate challenging concepts more confidently. All key methodologies are still covered through supplemental resources available at https://cloud.hacktricks.xyz. However, with the added benefit of instructor-led sessions, learners receive step-by-step insights and can ask questions in real time—ensuring a more supportive and interactive learning experience. This approach helps you not only complete the labs successfully but also truly grasp the techniques required for certification.
No, you don’t need to pass any exam to be AzRTA certified, you just need to complete the course and the hands on labs and you will get your certificate.
No, it’s not. Access to both the course materials and the labs is activated at the same time. All access will be provided through Cyber Helmets once your enrollment is confirmed.
You will have 30 days of access to the labs as part of the course Student Pack provided through Cyber Helmets.
Yes, after successfully completing the hands on labs a PDF diploma with your name is provided. The diploma contains a QR code that can be used to verify its authenticity in training.hacktricks.xyz so fake diplomas can’t be created.
All the content of the HackTricks Training certifications were completely created by cloud security experts that have been doing cloud pentesting for more than 5 years and that have created these amazing courses and methodologies to make easier to other pentesters, security professionals or IT professionals to understand better how attacks work in the cloud.
Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.
To provide the best experiences, we and our partners use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us and our partners to process personal data such as browsing behavior or unique IDs on this site and show (non-) personalized ads. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Click below to consent to the above or make granular choices. Your choices will be applied to this site only. You can change your settings at any time, including withdrawing your consent, by using the toggles on the Cookie Policy, or by clicking on the manage consent button at the bottom of the screen.
Syllabus:
Azure Basics
Exploitation of Azure Services
Methologies
Common Detection Mechanisms
Syllabus:
Intro to GCP
Exploitation of GCP Services
Methodologies
Security Services
Syllabus:
Intro to AWS
Exploitation of AWS Services
Methologies
Common Detection Mechanisms
Fundamentals and Setup
Advanced Techniques and Practical Application
Advanced Techniques and Practical Application
Fundamentals & Setup