Identity-Centric Cloud Hacking
A deep dive into compromising cloud environments by abusing identity boundaries. You will exploit simulated real-world scenarios, leveraging token abuse, privilege escalation, and lateral movement techniques.
Enroll in Course