Course Logo

Red Team Tactics & Techniques Series

A modular course collection covering the offensive lifecycle. Select any module to see details and enroll.

Reconnaissance

11 techniques

Techniques for information gathering and target profiling.

Resource Development

8 techniques

Building resources and assets used to support operations.

Initial Access

11 techniques

Methods for gaining initial foothold inside target environment.

Execution

17 techniques

Techniques that execute adversary-controlled code on a system.

Persistence

23 techniques

Ways adversaries maintain persistent access to victim systems.

Privilege Escalation

14 techniques

Techniques used to gain higher-level permissions.

Defense Evasion

47 techniques

Methods to avoid detection by security tools and defenders.

Credential Access

17 techniques

Techniques to obtain credentials from systems and users.

Discovery

34 techniques

Techniques used to map and discover networks and resources.

Lateral Movement

9 techniques

Ways attackers move through a network after initial access.

Collection

17 techniques

Gathering data of interest from target systems.

Command and Control

18 techniques

Infrastructure and methods to control compromised hosts.

Exfiltration

9 techniques

Techniques for removing data from a target environment.

Impact

15 techniques

Techniques that manipulate, disrupt or destroy systems and data.