Offensive Azure Operations & Tactics Course

  • Dates: May 10, 11 and 12 2025
  • Difficulty: Medium
  • Session Format: On-Site

Description

Offensive Azure Operations & Tactics Certification Course is a meticulously crafted training course that brings the offensive side of Azure cloud security to life. This course provides a unique opportunity to learn directly from experts who have honed their skills through real-world penetration testing engagements.

The course is structured to take participants from foundational knowledge to advanced offensive techniques, focusing entirely on how to exploit weaknesses in Azure environments. Each lab and scenario has been developed based on the team’s extensive experience in conducting real-world Azure penetration tests, ensuring that the skills you acquire are both practical and immediately applicable.

Throughout the training, attendees will explore and exploit a wide range of misconfigurations unique to Azure, including identity and access management flaws, network misconfigurations, and weaknesses in cloud-native services. You'll engage in hands-on labs that mimic actual cloud environments, learning to use industry-standard tools and methodologies to compromise Azure services, ensuring they gain the skills needed to successfully breach Azure infrastructures.

By the end of the course, participants will be equipped with the knowledge and tools necessary to conduct thorough and effective penetration tests on Azure environments, uncovering even the most hidden misconfigurations.

Key Learning Objectives

  1. Foundational to Advanced Azure Exploitation Techniques: Build a strong understanding of how to abuse misconfigurations in Azure environments, progressing from basic concepts to more advanced tactics such as bypassing security controls and compromising critical Azure services, performing lateral movement across the enterprise environment.

  2. Hands-On Learning with Realistic Labs: Engage in practical exercises and labs that replicate real-world Azure environments, providing you with the experience needed to apply offensive security techniques in a professional career.

  3. Comprehensive Offensive Skill Development: Develop a robust skillset focused solely on the offensive side of Azure security, providing you with the skills and knowledge needed to conduct comprehensive penetration tests and identify critical weaknesses in Azure cloud infrastructures.

Who Should Attend?

  1. Penetration Testers: Professionals who want to specialize in Azure environments and enhance their offensive security skills.

  2. Security Analysts and Engineers: Individuals who focus on security and want to gain deeper insights into Azure vulnerabilities and exploitation techniques.

  3. Red Team Members: Those involved in simulating attacks to assess organizational defenses and seeking to refine their skills in Azure-specific scenarios.

  4. Cloud Security Professionals: Experts in cloud security who aim to understand offensive tactics in Azure to better protect their environments.

  5. IT and Network Administrators: Technical professionals who manage Azure environments and want to learn how attackers might exploit these systems.

  6. Cybersecurity Enthusiasts: Individuals with a keen interest in offensive security and Azure who are looking to deepen their knowledge and practical experience.

This course is geared towards those with a solid understanding of basic cloud and security concepts, looking to focus specifically on offensive strategies in Azure environments.

Prerequisite Knowledge

Basic PowerShell knowledge Basic command line usage in Windows Basic understanding about Azure & Security in general

Hardware Requirements

Students will need to have an Azure Tenant with P2 License and Subscription with Global Admin privileges. All the Labs will be deployed in the Student’s Azure Tenant. Participants should bring a laptop with wireless card to access event's wifi and equipped with a minimum of 8GB RAM and VMWare Pro installed. We'll provide a Windows OVA file for installation within VMWare Pro during the course.

Bio

Chirag Savla , White Knight Labs

Chirag Savla is a cyber security professional with 10+ years of experience. His areas of interest include penetration testing, red teaming, azure and active directory security, and post-exploitation research. For fun, he enjoys creating open-source tools and exploring new attack methodologies in his leisure. Chirag has worked extensively on Azure, Active Directory attacks and defense, and bypassing detection mechanisms. He is the author of multiple open source tools such as Process Injection, Callidus, and others. He has presented at many conferences and local meetups and has trained people in international conferences like Blackhat, BSides Milano, Wild West Hackin’ Fest, HackSpaceCon, VulnCon etc.

Raunak Parmar , White Knight Labs

Raunak Parmar works as a senior cloud security engineer at White Knight Labs. His areas of interest include web penetration testing, Azure/AWS security, source code review, scripting, and development. He enjoys researching new attack methodologies and creating open-source tools that can be used during cloud red team activities. He has worked extensively on Azure and AWS and is the author of Vajra, an offensive cloud security tool. He has spoken at multiple respected security conferences like Black Hat, Defcon, Nullcon, RootCon, and also at local meetups.

Return to training sessions