
This course teaches a practical methodology for identifying Microsoft 365 usage, gaining initial access, performing post-compromise reconnaissance, abusing OAuth and application trust, establishing persistence, escalating privileges, and harvesting high-value data from cloud-based collaboration and identity platforms.
On-Demand $295.00
Course Length: 8 Hours
Includes a Certificate of Completion
Next scheduled date:
Notify me when available
On-Demand
Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:
- Full access to video recordings, slides, and downloadable resources
- Hands-on labs and virtual machines to reinforce real-world skills
- Cyber Range access for immersive practice (select courses)
- Dedicated Discord support from instructors and peers
- Certificates of participation upon completion
Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

