Hacking, Cyber Security
Edu type:
Course or training
Den Haag, Online
Master (EQF 7)
Start date:
Study Load:
40 hrs
5 days
More information


The Red Teaming Operations course will offer you an unique perspective on how to employ offensive hacking techniques to emulate real world threats against physical and technological environments within an organisation to test resilience and awareness.


You will learn about techniques to infiltrate secure locations of an organization, access their computer network, perform lateral movement in the network, privilege escalation, tunnelling and detection avoidance. 


Target Group

The course is designed for professionals in the cyber and risk management field who are looking to strengthen their expertise on scenario-based adversarial simulations. You could also be an application developer, security engineer or IT professional with a broad interest in hacking.


Introduction to Red Teaming Operations (RTO) – Day 1 & 2
During the Introduction to Red Teaming Operations (RTO) we will focus on methodologies and planning that are required to perform a successful Red Teaming operation. We will run a number of practical exercises focused on boosting your skillset in open source intelligence (OSINT), reconnaissance, social engineering and exploitation of physical security weaknesses.

Tactical Network Exploitation (TNE) - Day 3 / 4 / 5
What happens once an attacker gains an initial foothold into your organisation? During the last three days of training, we will focus on tactical network exploitation techniques. You will practice what you learned in a simulated network, which contains everything you might expect in a real corporate network, trying to achieve a set of realistic objectives while avoiding detection.