The original post: /r/cybersecurity by /u/TheMoreYouKnow007 on 2025-01-23 20:26:24.

Good afternoon,

I am currently an associate consultant and feel very stagnant in my career. It’s been two years since I started my IT career, and I would love to be a cloud security engineer. I have been trying to pivot from my current role and have received a lot of rejections and fewer interviews. For the last two years, I’ve been put on projects thrown at me (even talking with my manager), so I haven’t been honing on the skills needed in Cloud sec; I did achieve multiple certifications but haven’t done any personal projects. I am pursuing a WGU degree in cloud computing for personal reasons, so that’s my main focus. I want to do a personal project (s) this year, but I have also picked up learning pen-testing on the side for hobby reasons. I am doing TryHackMe’s red team path, and afterward, I want to do HackTheBox’s pen-testing course, which is the question I wanted to ask. Did anyone ever take these certifications before?

White Knight Labs Offensive Azure Operations and Tactics Certification

Cloudbreach’s Breaching Azure

XINTRA’S Attacking and Defending Azure & M365

Altered Security’s Attacking and Defending Azure

MOSSE Cybersecurity’s MCPT - Certified Cloud Penetration Tester

I have done the PWNEDLabs boot camp, just a walkthrough of the labs, but I am looking for something hands-on. These certifications are hands-on, but I wanted feedback from people who have taken them because they are expensive, and I know cloud pen testing is new. Or should I not take them and focus on my WGU degree, building a personal project, and finishing my TryHackMe/HackTheBox pathways, especially with the free resources out here?

Cloud Hacking Labs

The goal is to gain cloud security skills to become an engineer. Am I doing this correctly? What do you guys suggest if you work as a cloud security engineer?

P.S. Just a little more background on me, I am supposedly a cloud security associate consultant but haven’t done any engagements relating to that. I was a soc analyst beforehand.