Cloud Hacking: How to Do Penetration Testing Using the Cloud

Learn to harness the power of cloud providers for penetration testing. This course teaches you how to launch advanced attacks, hack systems, bypass 2FA, gain unauthorized access, and deliver malware — all from a cloud environment, with zero prior experience required.

4.7
(700)
7,000 Students
9 Hours
Stage 5 - Advanced

Last update: Mar 2024

Audio Language: English

Subtitles/Captions: Yes

Type of Training: Online self-paced

Focus: Ethical Hacking Courses, Penetration Testing Training Courses, Cloud Security Training, Cloud Computing Courses

Caption Language: English

Cloud Hacking

What You’ll Learn

This cloud penetration tester course will teach you:

  • Cloud-Based Phishing:
    Clone websites, serve fake login pages, and bypass 2FA using advanced phishing techniques and tools like Evilginx.
  • Cross-Platform Malware Delivery:
    Build custom download pages that deliver trojans based on the target's operating system, using file type manipulation and convincing URLs.
  • Remote System Access:
    Gain unauthorized access and control of Windows, Linux, and macOS systems from the cloud, including access to files, cameras, and keystrokes.
  • Command & Control (C2) Servers:
    Set up and manage cloud-based C2 servers using tools like Starkiller, Empire, and Discord for persistent access and post-exploitation.
  • Cloud Infrastructure for Hacking:
    Launch Kali Linux in AWS, configure DNS and HTTPS, and host phishing pages with custom domains.
  • Browser-Based Exploits:
    Use fake browser windows and JavaScript payloads to steal credentials and track users with mobile-optimized BitB attacks.
  • Trojan Creation & Payloads:
    Build and deliver backdoors for Windows, Linux, and macOS, and learn how to gain access and maintain stealth and persistence.

Included in the Penetration Tester Cloud Hacking Course

9 Hours of On-Demand Video

9 Downloadable Resources

1 Article

Access on Mobile

Certificate of Completion

Suitable for the Following Careers

Penetration Tester

Ethical Hacker

Red Team Operator

Cybersecurity Researcher

Cloud Security Specialist

Course Content

Training Overview

icon-yt Description of Training Preview

Introduction to Cloud Computing for Hackers

icon-yt Teaser Preview
icon-yt Introduction to Hacking Using the Cloud Preview
icon-yt What is the Cloud Preview
icon-yt Why Learn Cloud Computing as a Hacker Preview

Cloud Basics

icon-yt Introduction to Cloud Basics Preview
icon-yt Signing Up With AWS Preview
icon-yt Installing Kali Linux On The Cloud Preview
icon-yt Communicating With Cloud Computers Remotely Using SSH Preview
icon-yt Linux Terminal Basics Preview

Phishing

Phishing - Bypassing 2-Multi Factor Authentication (2FA-MFA)

Accessing Cloud Server Desktop

BitB - Browser In Browser Attack

Mobile BitB - Mobile Friendly Phishing & 2FA Bypass

Multi-BitB Attack

Hacking Web Browsers

Command & Control Servers (C2-C&C)

Hacking Windows, Linux & Apple Mac OS From the Cloud

Post Exploitation With StarKiller

Hacking Windows Using Discord as a C2

Windows Post Exploitation via Discord

Creating Windows Trojans

Creating Apple Mac OS & Linux Trojans

Advanced Malware Delivery

Audio

OPEN FULL CURRICULUM

Requirements

Basic IT skills

No prior hacking, Linux, or programming experience required

A computer with at least 4GB RAM

Operating system: Windows, macOS, or Linux

Description of Cloud Hacking: How to Do Penetration Testing Using the Cloud

This hands-on ethical hacking course teaches you how to leverage cloud services for advanced attacks — no prior experience required. You’ll start with an introduction to cloud platforms like AWS and learn how to set up your hacking environment with Kali Linux in the cloud.

From there, you’ll dive into phishing, account takeovers, and 2FA bypass techniques using Evilginx and browser-in-browser attacks. Learn to hack web browsers, craft custom download pages, and manipulate URLs to deliver payloads for Windows, Linux, and macOS. You’ll build C2 servers using Empire, Starkiller, and even Discord, then carry out real-world post-exploitation techniques like password stealing, webcam access, and ransomware deployment. Exploit security vulnerabilities, gain access, and simulate security breaches.

  • Set up and use Kali Linux in the cloud
  • Create phishing pages with HTTPS and custom domains
  • Hack systems using C2 frameworks like Empire and Discord
  • Develop and deliver trojans for multiple OS platforms
  • Capture passwords, keystrokes, webcam feeds, and more
  • Use DNS, SSH, FTP, and web hosting in real-world attacks
  • Track users and steal data through advanced BitB methods

By the end of the course, you’ll be equipped with a strong foundation in ethical hacking, capable of modifying and applying techniques in real-world scenarios—and defending against them, minimizing network security risks for your clients.

Who Is This Course For

By the end of this course, you’ll have a complete toolkit for cloud-based hacking and the skills to adapt your attacks to different systems, targets, and environments. Anyone interested in ethical hacking, network security, cloud infrastructure, red teaming, and defending against data breaches will find this course invaluable.

Course Instructor

ZAID AL QURAISHI

Zaid Al-Quraishi is an accomplished ethical hacker, pentester, and computer scientist passionate about hacking and breaking the rules ethically. With extensive experience in ethical hacking, Zaid began creating video tutorials for iSecur1ty in 2009, earning positive feedback that led to his promotion as an editor. He is also a member of iSecur1ty's penetration testing team.

In 2013, Zaid launched his first online course at iSecur1ty's training center, receiving outstanding learner reviews. Motivated by this success, Zaid developed additional courses, all of which have been well-received.

Zaid's teaching method is primarily example-based. He begins by explaining the theory behind each technique and then demonstrates its application in real-life situations, providing learners with a comprehensive understanding of ethical hacking practices.

Read More

Read Less

Testimonials

Anonymous

Vp M.

Teacher Zaid is the best instructor of all time. Thank you for sharing your knowledge and skills with us, sir. Appreciated it.🤝

Anonymous

Khulani H.

The course is very informative, and the instructor's examples and walk-throughs are very good. Loved it. It gave a great foundation to learn more to upskill.

Anonymous

Victoria V.

This man is a natural teacher! The course is well thought out, presented well and is very organized. This guy is a real authority and really knows this stuff.

Show More

Show Less

Frequently Asked Questions

Students Who Took This Course Also Liked

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!