Skip to main content

5 Classes

Red Team Operator
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Red Team Operator

A Red Team member is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).  They understand the phases from pre-engagement through post reporting of an offensive risk assessment.


This training path covers the following separate certification course sections along with several specialized courses:

  • CEHv10 - Certified Ethical Hacker
  • CompTIA CySA+
  • CompTIA Pentest+
  • Pivoting and Reverse Tunneling
  • OSINT Reconnasiance
  • Cyber Range Management

*** Course list is subject to change and new courses are added.

PayPal

Hacking / Red Team Training

Cyber Range Management

Certified Ethical Hacker Course
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Certified Ethical Hacker Course

PayPal
Pentest+ Online Course
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Pentest+ Online Course

What Skills Will You Learn?


PLANNING & SCOPING

Explain the importance of planning and key aspects of compliance-based assessments

INFORMATION GATHERING & VULNERABILITY IDENTIFICATION

Gather information to prepare for exploitation then perform a vulnerability scan and analyze results.

ATTACKS & EXPLOITS

Exploit network, wireless, application, and RF-based vulnerabilities, summarize physical security attacks and perform post-exploitation techniques

PENETRATION TESTING TOOLS

Conduct information gathering exercises with various tools and analyze the output and basic scripts (limited to Bash, Python, Ruby, PowerShell)

REPORTING & COMMUNICATION

Utilize report writing and handling best practices explaining recommended mitigation strategies for discovered vulnerabilities

PayPal
Pivoting and Reverse Tunneling
Hacking / Red Team Training
Preview Course

Hacking / Red Team Training

Pivoting and Reverse Tunneling

This course covers how to communicate system to system during an assessment.  One of the biggest challenges is that you found a vulnerability to exploit, but you run into a road block...  The firewall is blocking incoming connections outside the vulnerable port or you don't have a static IP address.  As ethical hackers and pen testers, we may be working out of a hotel room at night.  How can you connect to the target systems on the inside of their network?  This course explains the challenges in depth and walks through solutions to many of these common challenges.