This program is designed for individuals with intermediate experience in Red Team operations who possess a solid foundation in cybersecurity and penetration testing principles. It is ideal for learners seeking to enhance their practical Red Team capabilities through interactive, hands-on keyboard exercises that leverage real world tools, techniques, and simulated vulnerabilities.

An experienced instructor will be available throughout the course to provide guidance and support, ensuring participants build both the technical skills and confidence needed to succeed.
An experienced instructor will be available throughout the course to provide guidance and support, ensuring participants build both the technical skills and confidence needed to succeed.
• Intermediate-Level Cybersecurity Students
• Penetration Testers
• Experienced Red Team Enthusiasts
• Discovery
• Reconnaissance
• Initial Access
• Privilege Escalation
• Collection
• Impact
• File Analysis
• Application Security
• Vulnerability Assessment
• Malware Analysis
• Intermediate-Level Cybersecurity Students
• Penetration Testers
• Experienced Red Team Enthusiasts
• Solid foundation in cybersecurity and penetration testing principles
Workstation Requirements
• Google Chrome browser with Remote Desktop Protocol (RDP) support
• Supported operating systems: Windows, Linux, or macOS
• Chromebooks, tablets, and mobile phones are not supported
• Participants using systems with restrictive security configurations (e.g., Endpoint Detection and Response [EDR] solutions) are advised to temporarily disable these features, as they may interfere with lab activities
• When possible, participants are encouraged to use personal laptops to avoid organizational security restrictions
If format is ONLINE Network Requirements
• A minimum of 3 Mbps of internet bandwidth per participant
• No firewall restrictions that block required ports or IP addresses
• Preferred network access configuration:
• Whitelist *.cywaria.net/ and ensure access to port 8443
• An unrestricted internet connection with no port or IP filtering is ideal
• If feasible, participants are encouraged to bring or use personal mobile hotspots