All Courses
Pick your cloud.
Own it.
Three courses covering Azure and AWS offensive security. Each one ends with a practical, report-based certification exam. No vendor vouchers. No theory trivia.

Breaching Azure
Master offensive Azure security from the attacker's perspective.
- Enumerate Azure environments without generating high-fidelity alerts
- Abuse Entra ID identities and OAuth flows to obtain persistent access
- Exploit Managed Identities to pivot across Azure resources

Breaching AWS
Attack AWS environments the way real threat actors do.
- Enumerate AWS IAM configurations to identify attack paths
- Exploit SSRF vulnerabilities to steal IAM credentials from the metadata service
- Abuse S3 bucket misconfigurations for data exfiltration

Breaching Azure Advanced
Beyond the surface. Advanced Azure attack techniques for senior red teamers.
- Abuse PIM and Conditional Access to bypass modern identity controls
- Execute cross-tenant attacks and establish persistent cross-boundary access
- Compromise Azure DevOps pipelines and exfiltrate pipeline secrets
Not sure where to start? Begin with Breaching Azure or Breaching AWS. No cloud security prerequisites required.
Compare courses
All courses include lifetime access, Discord community support, and report-based certification exams.
| Feature | OASPBreaching Azure | OAWSPBreaching AWS | OASEBreaching Azure Advanced |
|---|---|---|---|
| Level | Intermediate | Intermediate | Advanced |
| Certification | OASP | OAWSP | OASE |
| Labs | 30 | 30 | 35 |
| Modules | 8 | 8 | 9 |
| Exam attempts | 1 | 1 | 1 |
| Lifetime access to course material | |||
| Discord community | |||
| View course | View course | View course |
Not sure which course to take?
Start with Breaching Azure if you're working primarily in Azure environments. Breaching AWS is the natural starting point for AWS-heavy teams. Do both for full cloud coverage.