Cloud Hacking: How to Do Penetration Testing Using the Cloud
Learn to harness the power of cloud providers for penetration testing. This course teaches you how to launch advanced attacks, hack systems, bypass 2FA, gain unauthorized access, and deliver malware — all from a cloud environment, with zero prior experience required.
What You’ll Learn
This cloud penetration tester course will teach you:
- Cloud-Based Phishing:
Clone websites, serve fake login pages, and bypass 2FA using advanced phishing techniques and tools like Evilginx. - Cross-Platform Malware Delivery:
Build custom download pages that deliver trojans based on the target's operating system, using file type manipulation and convincing URLs. - Remote System Access:
Gain unauthorized access and control of Windows, Linux, and macOS systems from the cloud, including access to files, cameras, and keystrokes. - Command & Control (C2) Servers:
Set up and manage cloud-based C2 servers using tools like Starkiller, Empire, and Discord for persistent access and post-exploitation.
- Cloud Infrastructure for Hacking:
Launch Kali Linux in AWS, configure DNS and HTTPS, and host phishing pages with custom domains. - Browser-Based Exploits:
Use fake browser windows and JavaScript payloads to steal credentials and track users with mobile-optimized BitB attacks. - Trojan Creation & Payloads:
Build and deliver backdoors for Windows, Linux, and macOS, and learn how to gain access and maintain stealth and persistence.
Included in the Penetration Tester Cloud Hacking Course
Suitable for the Following Careers
Course Content
Training Overview
Introduction to Cloud Computing for Hackers
Cloud Basics
Phishing
Phishing - Bypassing 2-Multi Factor Authentication (2FA-MFA)
Accessing Cloud Server Desktop
BitB - Browser In Browser Attack
Mobile BitB - Mobile Friendly Phishing & 2FA Bypass
Multi-BitB Attack
Hacking Web Browsers
Command & Control Servers (C2-C&C)
Hacking Windows, Linux & Apple Mac OS From the Cloud
Post Exploitation With StarKiller
Hacking Windows Using Discord as a C2
Windows Post Exploitation via Discord
Creating Windows Trojans
Creating Apple Mac OS & Linux Trojans
Advanced Malware Delivery
Audio
OPEN FULL CURRICULUM
Requirements
Description of Cloud Hacking: How to Do Penetration Testing Using the Cloud
This hands-on ethical hacking course teaches you how to leverage cloud services for advanced attacks — no prior experience required. You’ll start with an introduction to cloud platforms like AWS and learn how to set up your hacking environment with Kali Linux in the cloud.
From there, you’ll dive into phishing, account takeovers, and 2FA bypass techniques using Evilginx and browser-in-browser attacks. Learn to hack web browsers, craft custom download pages, and manipulate URLs to deliver payloads for Windows, Linux, and macOS. You’ll build C2 servers using Empire, Starkiller, and even Discord, then carry out real-world post-exploitation techniques like password stealing, webcam access, and ransomware deployment. Exploit security vulnerabilities, gain access, and simulate security breaches.
- Set up and use Kali Linux in the cloud
- Create phishing pages with HTTPS and custom domains
- Hack systems using C2 frameworks like Empire and Discord
- Develop and deliver trojans for multiple OS platforms
- Capture passwords, keystrokes, webcam feeds, and more
- Use DNS, SSH, FTP, and web hosting in real-world attacks
- Track users and steal data through advanced BitB methods
By the end of the course, you’ll be equipped with a strong foundation in ethical hacking, capable of modifying and applying techniques in real-world scenarios—and defending against them, minimizing network security risks for your clients.
Who Is This Course For
By the end of this course, you’ll have a complete toolkit for cloud-based hacking and the skills to adapt your attacks to different systems, targets, and environments. Anyone interested in ethical hacking, network security, cloud infrastructure, red teaming, and defending against data breaches will find this course invaluable.
Course Instructor
Zaid Al-Quraishi is an accomplished ethical hacker, pentester, and computer scientist passionate about hacking and breaking the rules ethically. With extensive experience in ethical hacking, Zaid began creating video tutorials for iSecur1ty in 2009, earning positive feedback that led to his promotion as an editor. He is also a member of iSecur1ty's penetration testing team.
In 2013, Zaid launched his first online course at iSecur1ty's training center, receiving outstanding learner reviews. Motivated by this success, Zaid developed additional courses, all of which have been well-received.
Zaid's teaching method is primarily example-based. He begins by explaining the theory behind each technique and then demonstrates its application in real-life situations, providing learners with a comprehensive understanding of ethical hacking practices.
Read More
Read Less
Testimonials
Vp M.
Teacher Zaid is the best instructor of all time. Thank you for sharing your knowledge and skills with us, sir. Appreciated it.🤝
Khulani H.
The course is very informative, and the instructor's examples and walk-throughs are very good. Loved it. It gave a great foundation to learn more to upskill.
Victoria V.
This man is a natural teacher! The course is well thought out, presented well and is very organized. This guy is a real authority and really knows this stuff.
Show More
Show Less