Talk With an Expert

In today's rapidly evolving threat landscape, red teaming plays a crucial role in cybersecurity. As threats continue to advance and become more sophisticated, organizations must proactively assess their security measures. Red teaming involves testing the effectiveness of people, processes, and technology through objective-oriented assessments that simulate realistic attacker techniques. By leveraging threat intelligence and emulating real-world environments, red teams provide invaluable insights into an organization's vulnerabilities. This practice helps identify weaknesses, enhance defense strategies, and strengthen incident response capabilities. The main objective of red teaming is to make the blue team better by informing both offense and defense. By continually challenging and refining security measures, organizations can stay one step ahead of emerging threats. Through the collaborative efforts of red and blue teams, organizations can effectively mitigate risks, safeguard sensitive data, and maintain a robust security posture in the face of evolving cyber threats.

An Intro to C for Windows Devs

This workshop serve is a prerequisite for those interested in taking the SEC670 course. This first part will cover basic items such as, setting up Visual Studio Community, creating a project, developing your first project, etc. We will then dive into the C programming language itself covering data types, the anatomy of a function, statements, variables, directives, and debugging.

Red Team

Learn About SEC565: Red Team Operations and Adversary Emulation

SEC565: Red Team Operations and Adversary Emulation

The best defense is a strong offense. Red Team sets the pace for protecting the entire organization. SEC565 trains security professionals to take the lead. Learn how to execute repeatable Red Team engagements, with an emphasis on people, processes, and technologies to ready Blue Team defenses. Develop and improve Red Team operations by employing techniques for security controls through adversary emulation, cyber threat intelligence, Red Team tradecraft, and engagement planning.

Learn More

SEC670: Red Teaming Tools - Developing Windows Implants, Shellcode, Command and Control

Malware is becoming more lethal. Red Teams must understand these increasingly complex attacks that threaten safety. SEC670 takes offensive operations to a new level. This course introduces techniques that real nation-state malware actors are deploying today. Red Teams will learn how to develop custom-compiled offensive tools through programming, APIs, and applied mitigations for techniques covering privilege escalation, persistence, and collection. This training is a must-have for cybersecurity practitioners working in the areas of Defense, Government, Critical Infrastructure, Energy and Financial Services.

Learn More