This program is designed for beginners with little to no prior experience in Red Team operations who possess a foundational understanding of cybersecurity principles. It is ideal for learners seeking to build practical Red Team skills through interactive, hands-on keyboard exercises that utilize real-world tools and vulnerabilities.

Participants assume the role of a penetration testing team conducting a covert engagement against a fictitious organization. Through this scenario-based approach, learners perform open-source intelligence (OSINT) research on real-world vulnerabilities and apply exploitation techniques within a controlled lab environment featuring both Linux and Windows operating systems.Guided instruction is provided throughout the program, with an experienced instructor available to support participants at each stage of the learning process.
This ensures the development of both technical proficiency and operational confidence.
Participants assume the role of a penetration testing team conducting a covert engagement against a fictitious organization. Through this scenario-based approach, learners perform open-source intelligence (OSINT) research on real-world vulnerabilities and apply exploitation techniques within a controlled lab environment featuring both Linux and Windows operating systems.Guided instruction is provided throughout the program, with an experienced instructor available to support participants at each stage of the learning process.
This ensures the development of both technical proficiency and operational confidence.
• Intermediate-Level Cybersecurity Students
• Penetration Testers
• Experienced Red Team Enthusiasts
• DiscoveryReconnaissance
• Initial Access
• Privilege Escalation
• Collection
• Impact
• File Analysis
• Application Security
• Identity and Access Management (IAM
• Vulnerability Assessment
• Malware Analysis
• Intermediate-Level Cybersecurity Students
• Penetration Testers
• Experienced Red Team Enthusiasts
Solid foundation in cybersecurity and penetration testing principles
Workstation Requirements
• Google Chrome browser with Remote Desktop Protocol (RDP) support
• Supported operating systems: Windows, Linux, or macOSChromebooks, tablets, and mobile phones are not supported
• Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities
• When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions
If format is ONLINE Network Requirements
• A minimum of 3 Mbps of internet bandwidth per participant
• No firewall restrictions that block required ports or IP addresses
• Preferred network access configuration:
• Whitelist *.cywaria.net/ and ensure access to port 8443
• An unrestricted internet connection with no port or IP filtering is ideal
• If feasible, participants are encouraged to bring or use personal mobile hotspots