Red Team Operator Part I

This 3-day intensive training immerses offensive security professionals in advanced adversary simulation techniques used by modern threat actors. Through a practical, hands-on approach, you'll master Command & Control (C2) frameworks, privilege escalation, evasion techniques, and payload development. You'll gain in-depth skills in attacks and OPSEC-safe operations for real-world red teaming.

You’ll work through realistic attack scenarios and threat emulation exercises, bridging the gap between offensive theory and real-world engagements. Ideal for red teamers, penetration testers, and security professionals aiming to deepen their offensive tradecraft.

By enrolling, you’ll gain access to all training materials, labs, and our private community for collaboration, threat intelligence sharing, and ongoing skill development.

Course curriculum

    1. Introduction to Red Teaming

    2. Red Team Definition

    3. Methods for Red Teaming

    4. Red Teaming Benefits

    5. Red Team Engagement Planning Part I

    6. Red Team Engagement Planning Part II

    7. MITRE Framework

    8. Phases of the Intrusion Kill Chain Part I

    9. Phases of the Intrusion Kill Chain Part II

    10. Phases of the Intrusion Kill Chain Part III

    11. Phases of the Intrusion Kill Chain Part IV

    1. Installing Atomic Red Team

    2. Adversary Emulation with Atomic Red Team

    3. Adversary Emulation with CALDERA Part I

    4. Adversary Emulation with CALDERA Part II

    5. Adversary Emulation with CALDERA Part III

    1. Macros for Initial Access

    2. VBA examples

    3. Initial Access, Obfuscation and C2

    4. Advanced Obfuscation Techniques Part I

    5. Advanced Obfuscation Techniques Part II

    6. Advanced Obfuscation Techniques Part III

    7. Bypassing Windows Defender

    8. Command & Control C2 and Bypassing Defenses Part I

    9. Command & Control C2 and Bypassing Defenses Part II

    10. Command & Control C2 and Priv Esc

    11. Command & Control C2 and BOF

About this course

  • 27 lessons
  • 9 hours of video content

Requirements

While not mandatory, it is recommended that participants have the following tools installed to fully engage with the hands-on exercises:

  • Kali Linux VM
  • Windows 10 VM

These tools will enhance your ability to work effectively with the course materials and practical exercises.