What about this course?
This on-demand course is intended for IT and security professionals who want to apply the most common attacks and security pitfalls in order to compromise an Azure Tenant. We will discuss different ways of achieving initial access, privilege escalation and persistence in a compromised environment. Furthermore, to evaluate and understand the risks that a legacy on-premise environment brings to a tenant, we will analyze and demonstrate different attacks such as Golden SAML, Abusing Single-Sign On and others.
Instructor for this course
eCTHP, eCPTX, OSCE, OSCP, GCFA, AZ-500, Microsoft INF260x
This course is composed by the following modules
Penetration Testing & Authorizations
Azure AD & Azure Killchain
Phishing & MFA
Password Spraying & Password Reuse
On-Prem to Azure
Phishing with Device Code API
Enumeration as Guest
Enumeration as Insider
Conditional Access Policies
Privilege Escalation - DynamicGroups
Persistence & Backdooring
Hybrid Access & Conditional Access from Trusted Locations
Abuse of Seamless SSO
Golden SAML & Primary Refresh Token
Common Course Questions
If you have a question you don’t see on this list, please visit our Frequently Asked Questions page by clicking the button below.
If you’d prefer getting in touch with one of our experts, we encourage you to call one of the numbers above or fill out our contact form.
Do you offer training for all student levels?