Joel Serna Moreno
Certificate ID:
15-03-2026
Exploiting identity and access misconfigurations in GCP to gain access to sensitive secrets, Decoding keys and using them to bypass authentication barriers, Enumerating and abusing Cloud Run, GCP Secrets Manager, and IAM permissions, Pivoting from GCP to AWS through OIDC-based federated identity impersonation, Assuming AWS roles and escalating privileges by chaining multiple trust relationships, Interacting with AWS services such as S3, EC2, and SSM to extract and decrypt sensitive files, Leveraging in-cloud privilege escalation to discover and use advanced credentials, Re-pivoting from AWS back to GCP using credentials exfiltrated during the attack path, Impersonating high-privilege service accounts within GCP to access restricted buckets and systems, Gaining interactive access to a target GCP-hosted machine and bypassing local privilege protections
bf6bc9b5-59d7-418f-8e00-caa5bf37654b
STORM LAB

Distributed by:

Issued to

Joel Serna Moreno

Want to report a typo or a mistake?

Credential Verification

Issue date: March 15, 2026

ID: bf6bc9b5-59d7-418f-8e00-caa5bf37654b

Issued by

Extreme Red Team Laboratories

Extreme Red Team Laboratories LABS for Experts

Type

Certification

Level

Professional

Format

Hybrid

Duration

3 years

Price

Paid

Description

Exploiting identity and access misconfigurations in GCP to gain access to sensitive secrets, Decoding keys and using them to bypass authentication barriers, Enumerating and abusing Cloud Run, GCP Secrets Manager, and IAM permissions, Pivoting from GCP to AWS through OIDC-based federated identity impersonation, Assuming AWS roles and escalating privileges by chaining multiple trust relationships, Interacting with AWS services such as S3, EC2, and SSM to extract and decrypt sensitive files, Leveraging in-cloud privilege escalation to discover and use advanced credentials, Re-pivoting from AWS back to GCP using credentials exfiltrated during the attack path, Impersonating high-privilege service accounts within GCP to access restricted buckets and systems, Gaining interactive access to a target GCP-hosted machine and bypassing local privilege protections

Skills

AWS CLI (Command Line Interface)

AWS App Mesh

AWS Backup

AWS AppSync

Cloud-Based Integration

Cloud Operations

Cloud Security Strategy

Cloud Technologies

Cloud Security Infrastructure

Cloud Security Applications

Linux

Networking Specialist Certification

Security Management

Security Certified Network Architect

Security Context

Security Certified Network Professional

Security Testing