Certified Hybrid Multi-Cloud Red Team Specialist
CyberWarFare Labs training on "Attacking Hybrid Multi-Cloud Environment" aims to provide the trainees with the insights of the offensive / defensive techniques used by the Red and Blue Teams in an Enterprise Cloud Infrastructure. Learn about the following:
- Inventory Extraction and Attack Map Design for AWS, Azure, GCP & On-Premise
- Exploit widely used Cloud Services e.g., O365, G-Suite and Azure AD etc
- Lateral movement from on-premise to Cloud & vice-versa
- Backdoor Hybrid Multi-Cloud Environment for Stealth Persistence access
- Abusing Mis-Configured Cloud Services for Privilege Escalation
- Exfiltrate Sensitive Data from Hybrid Multi-Cloud Environment
- Bypassing Security Controls in Multi-Cloud Environment
- Exploiting Multi-Cloud Environment using Open-Source Exploitation Tools / Framework

[Training Dates Announced Enroll Now 25% OFF]
Certified Google Cloud Red Team Specialist
CyberWarFare Labs training on "Red Teaming in Google Cloud" aims to provide the trainees with the in-depth knowledge of the offensive techniques used by the Red Teams in an Enterprise Google Cloud Infrastructure. Highlights:
- Enumerating & Designing Attack Surface of Google Cloud Services
- Understanding & Abusing Core Google services
- Enumerating & Exploiting Google Kubernetes Services
- Post-Exploitation by abusing mis-configured Google Cloud Services
- Privilege Escalation by exploiting mis-configured OAuth & IAM
- Persistence Access in GCP by Temporary / Permanent Access Token & more...

[Training Dates Announced Enroll Now 25% OFF]
StealthOps: Red Team Trade-craft Targeting Enterprise Security Controls
This training aims to provide the trainees with the in-depth knowledge of the offensive techniques used by the Red Teams to evade / circumvent / bypass Enterprise Security Controls deployed in organizations. Highlights:
- Red Team Resource Development [Infra Setup]
- Abuse improperly placed and mis-configured security controls in infrastructure
- Trade-craft development for Offensive Operations
- Resource abuse using Windows APIs, C, C++ & Csharp
- Utilizing Trade-craft for Red Teaming in Hardened Environment
- Leveraging Endpoint Security Controls (AV, EDR, XDR) & so much more...

Certified Azure Cloud Red Team Specialist
CyberWarFare Labs training on "Attacking Azure Cloud Red Team" aims to provide the trainees with the in-depth knowledge of the offensive techniques used by the Red Teams in an Enterprise Microsoft Azure Infrastructure. Highlights:
- Enumerating & Designing Attack Surface of Azure Cloud Services
- Pivoting Azure Control Plane to the Date Plane
- Understanding & Abusing Core Azure services
- Stealth Persistence Access of Azure account by Service Principal
- Privilege Escalation by abusing mis-configured Role Based Access Control
- Mis-use Azure Authentication Methods [PHS, PTA, Federation] & so much more...

Certified AWS Cloud Red Team Specialist
CyberWarFare Labs training on "Red Teaming in AWS Cloud" aims to provide the trainees with the in-depth knowledge of the offensive techniques used by the Red Teams in an Enterprise AWS Cloud Infrastructure. Highlights:
- Enumerating & Designing Attack Surface of AWS Cloud Services
- Understanding & Abusing Core AWS services
- Exploit Lambda Function for Persistence & Privilege Escalation
- Pivoting & Lateral Movement using AWS VPC
- Post-Exploitation by abusing mis-configured AWS Services
- Data Exfiltration from S3, RDS, STS & Secret Manager etc & so much more...

CyberWarfare Operations: A Red & Blue Team Approach
CyberWarFare Labs Purple Team training aims to provide the trainees with the insights of the offensive / defensive techniques used by the Red and Blue Teams in an Enterprise on-prem as well as Cloud Infrastructure. Highlights:
- Extensive OSINT activities & Custom Web Exploitation
- Multiple segregated networks with updated Linux & Windows OS
- Exploiting combination of Linux & Windows machines under AD env
- Abusing mis-configurations of enterprise security solutions etc
- Host and Network based security solution
- Real Time Network Traffic Analysis & Attack Monitoring
- DFIR & EDR solutions
- On-prem to cloud & Cloud to on-prem detection + response
- Containerized environment detection & response
