
Join us for this pay-what-you-can, hands-on, virtual workshop with Antisyphon Instructor, Beau Bullock as he provides a foundational understanding of cloud security, exploring essential concepts and practices for securing cloud environments.
Course Length: 4 Hours
Includes a Certificate of Completion
Next scheduled date:
Notify me when available
Description
Join us for this pay-what-you-can, hands-on, virtual workshop with Antisyphon Instructor, Beau Bullock as he provides a foundational understanding of cloud security, exploring essential concepts and practices for securing cloud environments.
Attendees will gain insight into core areas such as authentication, identity and access management (IAM), API access, common attack methods, misconfigurations, and security best practices. Practical labs will offer hands-on experience with industry-standard command line tools and automated scanners, helping participants understand and mitigate security risks in diverse cloud settings. Through the labs, attendees will apply cloud security tools and techniques to reinforce learning and develop practical skills.
-
System Requirements
- Stable Internet access
- x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization (Apple Silicon is currently not supported)
- A computer with at least 8 GB of RAM. 16 GB is recommended
- VMWare Workstation or VMWare Fusion (VirtualBox and other VM software is not supported)
- Windows 10/11, MacOSX+, or a currently supported Linux Distribution
- Full Administrator/root access to your computer or laptop
- System should also have at least 40GB of available disk space to accommodate one VM
-
Student Requirements
- Internet access
- A credit card (You will be signing up for an AWS account. This services require a credit card for signing up.)
- Check that Amazon AWS services are available in your country. (Note that if you cannot sign up for this service you will not be able to participate in the labs)
Syllabus
-
- Introduction to Cloud Providers
-
- AWS, Azure, GCP, others
-
- SaaS vs IaaS vs PaaS
-
- Public/Private and Hybrid Clouds
-
- Core Services
-
- Cloud Security Fundamentals
-
- Introduction to Cloud Providers
-
- Cloud Authentication & Identity
-
- Protocols: OAuth, SAML & OpenID Connect
-
- Multi-Factor Authentication
-
- Identity and Access Management
-
- Role-Based Access Control
-
- API Access Methods
-
- Cloud Authentication & Identity
-
- Common Cloud Attacks & Misconfigurations
-
- Real-World Incidents
-
- Password Attacks
-
- Key & Token Theft
-
- Public Resource Exposure
-
- Threat Detection & Response
-
- Common Cloud Attacks & Misconfigurations
-
- Command Line Crash Course
-
- Overview of CLI Tools
-
- Security and DevSecOps
-
- Automating Tasks with Scripts
-
- Command Line Crash Course
-
- Automated Cloud Security Scanning
-
- Cloud Security Posture Management
-
- Automated Scanning Tools
-
- Vulnerability Identification & Exploitation
-
- Automated Cloud Security Scanning
About the Instructor
Beau Bullock
Bio
Beau Bullock is the Director of Emerging Threats and Advanced Testing at Black Hills Information Security (BHIS), where he leads research and offensive testing focused on cloud security, identity abuse, and emerging attack techniques. He has been with BHIS since 2014 and brings over a decade of hands-on experience in penetration testing and security research.
Beau is an active contributor to the information security community through open-source tooling, technical writing, conference talks, webcasts, and by teaching his course Breaching the Cloud, which focuses on real-world attack paths across modern cloud environments. His work emphasizes practical tradecraft, attacker mindset, and helping defenders understand how small misconfigurations lead to large-scale compromise. Beau also writes music to hack to under the name NOBANDWIDTH.
Related products
-
Faan RossouwLive4 Hrs
Workshop: Build a Multi-Modal C2 Covert Channel in Golang
View Course This product has multiple variants. The options may be chosen on the product page -
Hal DentonLive4 Hrs
Workshop: Telemetry to Tactics: A Hands-On Detection Engineering Workshop with Hal Denton
View Course This product has multiple variants. The options may be chosen on the product page -
Beau BullockLiveOD16 Hrs
Breaching the Cloud
View Course This product has multiple variants. The options may be chosen on the product page -
Troy WojewodaLive4 Hrs
Workshop: Foundations of Network Forensics and Analysis
View Course This product has multiple variants. The options may be chosen on the product page

