Hacking, Cyber Security
Edu type:
Course or training
Den Haag, Online
Master (EQF 7)
Start date:
Study Load:
40 hrs
5 days
More information


Hacking is not exclusive to cyberspace but can also pertain to the physical world. How are such attacks performed? What tactics and techniques do adversaries use to gain physical access without being noticed and exploit digital systems once they are in?


Course Objectives 

The Red Teaming Operations course will offer you an unique perspective on how to employ offensive hacking techniques to emulate real world threats against physical and technological environments within an organisation to test resilience and awareness.

You will learn about techniques to infiltrate secure locations of an organization, access their computer network, perform lateral movement in the network, privilege escalation, tunnelling and detection avoidance. 


Target Group

The course is designed for professionals in the cyber and risk management field who are looking to strengthen their expertise on scenario-based adversarial simulations. You could also be an application developer, security engineer or IT professional with a broad interest in hacking.


Introduction to Red Teaming Operations (RTO) – Day 1 & 2
During the Introduction to Red Teaming Operations (RTO) we will focus on methodologies and planning that are required to perform a successful Red Teaming operation. We will run a number of practical exercises focused on boosting your skillset in open source intelligence (OSINT), reconnaissance, social engineering and exploitation of physical security weaknesses.

Tactical Network Exploitation (TNE) - Day 3 / 4 / 5
What happens once an attacker gains an initial foothold into your organisation? During the last three days of training, we will focus on tactical network exploitation techniques. You will practice what you learned in a simulated network, which contains everything you might expect in a real corporate network, trying to achieve a set of realistic objectives while avoiding detection.

Pre-requirements for the TNE part:

• Practical hacking experience (e.g.: HackLab: Hands-On Hacking, OSCP, GPEN, etc.);

• Knowledge of Linux and computer networking.