Hacking is not exclusive to cyberspace but can also pertain to the physical world. How are such attacks performed? What tactics and techniques do adversaries use to gain physical access without being noticed and exploit digital systems once they are in?
Course Objectives
The Red Teaming Operations course will offer you an unique perspective on how to employ offensive hacking techniques to emulate real world threats against physical and technological environments within an organisation to test resilience and awareness.
You will learn about techniques to infiltrate secure locations of an organization, access their computer network, perform lateral movement in the network, privilege escalation, tunnelling and detection avoidance.
Target Group
Introduction to Red Teaming Operations (RTO) – Day 1 & 2
During the Introduction to Red Teaming Operations (RTO) we will focus on methodologies and planning that are required to perform a successful Red Teaming operation. We will run a number of practical exercises focused on boosting your skillset in open source intelligence (OSINT), reconnaissance, social engineering and exploitation of physical security weaknesses.
• Practical hacking experience (e.g.: HackLab: Hands-On Hacking, OSCP, GPEN, etc.);
• Knowledge of Linux and computer networking.