Attacking & Securing CI/CD Pipeline Course

  • Dates: May 10, 11 and 12 2025
  • Difficulty: Medium
  • Session Format: On-Site

Description

This course dives deep into the security intricacies of CI/CD pipelines, enabling participants to understand and address threats in these critical systems. Students will gain insights into pipeline vulnerabilities and misconfigurations. They’ll also explore best practices for securing environments like GitHub Actions, AWS CodeBuild, CircleCI and Azure DevOps.

The program is tailored for DevSecOps professionals, red teamers, and security engineers aiming to enhance their skills in securing and attacking CI/CD pipelines. Key Highlights:

  • Learn to identify and exploit CI/CD vulnerabilities.
  • Master defensive strategies to protect pipelines from real-world attack vectors.
  • Hands-on labs simulating real world attacks
  • Lifetime access to materials and a dedicated lab environment.

Target Audience: This intermediate-to-advanced course is ideal for security professionals with a background in DevSecOps, scripting, and basic cybersecurity principles. Enthusiasts and students seeking practical exposure to CI/CD security will also find the content highly beneficial.

Student Requirements: Participants should have basic knowledge of scripting (Python/Bash), CI/CD processes, and access to tools like Docker, GitHub, and cloud environments.

Embark on this journey to gain actionable skills in attacking and securing CI/CD pipelines in today’s fast-evolving DevOps landscape.

Key Learning Objectives

  • CI/CD Overview
  • GitHub Actions Security
  • GitHub Actions Overview
  • Hijacking Techniques:
    • Content Script Injection
    • Pull Request Target Scenarios
    • Issue Comment Injection
    • Non-Ephemeral Runners
    • Workflow_Run Exploitation
    • Secret Leakage via Uploads
    • Artifact Poisoning
    • Race Conditions
    • Bypassing Protected Branches
    • OIDC Misconfigurations
    • Dependabot Automerge Vulnerabilities
  • GitHub Actions Security Best Practices

  • CircleCI Security

  • CircleCI Overview
  • Config.yml Hijacking

  • AWS CodeBuild Pipeline Security

  • CodeBuild Overview
  • Exploiting Pipeline Misconfiguration

  • Azure DevOps Security

  • Azure DevOps CI/CD Overview
  • Azure DevOps Pipeline Exploitation

Who Should Attend?

This course is intended for DevSecOps professionals, penetration testers, red team professionals and security engineers looking to specialize in CI/CD pipeline security. Those with a solid understanding of CI/CD processes and basic cybersecurity principles will benefit most. Blue teamers and security analysts who want to understand the latest techniques used to attack and protect CI/CD environments will also find this course valuable.

This on-demand course is perfect for:

  • Devops & DevSecOps Professionals – who’d like to better protect CI/CD pipelines
  • Cybersecurity Professionals: Seeking flexible, hands-on learning.
  • Students: In cybersecurity or cloud computing disciplines looking for practical, self-directed learning.
  • Red Team Operators: Aiming to advance their skills in CI/CD penetration testing with real-world labs.
  • Enthusiasts: Interested in on-demand, hands-on training to deepen their CI/CD security knowledge.

Prerequisite Knowledge

To enroll in the Attacking and Securing CI/CD On-Demand, students should meet the following requirements:

  • Familiarity with Scripting – Basic Knowledge of Python, Bash
  • Resources – 2 GitHub accounts, AWS environment, Azure environment, Docker on host machine
  • Hardware Requirements – Admin access to your tool environment and cloud
  • Prerequisite Knowledge – This is an intermediate to advanced course. A background in CI/CD processes, DevSecOps practices, and a basic understanding of cybersecurity principles is recommended. Familiarity with scripting and automation in CI/CD environments will be beneficial
  • Willingness to Learn

Hardware Requirements

Admin access to your tool environment and cloud, 2 GitHub accounts, AWS environment, Azure environment, Docker on host machine

Bio

Harish Poornachander , White Knight Labs

Harish Poornachander is an accomplished information security professional with expertise in application security, cloud security, and CI/CD pipeline security. He is the lead developer of the course on Attacking and Securing CI/CD Pipelines, where he provides hands-on insights into identifying and mitigating vulnerabilities in CI/CD pipelines.

With extensive experience in bug bounty programs, Harish has contributed to both sides of the ecosystem, serving as a skilled researcher and an efficient triager. He has reported CI/CD vulnerabilities and misconfigurations to major organizations, including Microsoft, Google, Apache, GitHub, and others.

Harish has earned the Microsoft's Most Valuable Researcher (MVR) 24 badge and was part of the Synack Red Team (SRT) at the 0x03 level. He is currently a member of the Yogosha Strike Force and holds the OSWE certification.

Return to training sessions