Skip to content
LP
[ TRAINING / IN-HOUSE.RED.TEAM ]

Build a red team
that knows your network cold.

This is not a course. It's a standing-up exercise. We pair our operators with your future red team members and train on your actual infrastructure, with your actual tooling, against your actual defenders.

Plan the programme
> OUTCOMES

What you walk away with.

A functioning red team

By end of engagement you have internal operators running offensive exercises, not just certified staff.

Operating on your real stack

Your EDR, your AD, your segmentation. No "lab abstractions" to translate afterwards.

Purple-team muscle memory

Blue-team drills against your red team become part of the normal operating rhythm.

Handoff-ready playbooks

We leave documentation, runbooks, and tooling tuned to your environment.

> CURRICULUM MODULES

Eight modules, sequenced to a full engagement.

M01

Adversary TTP simulation on your real AD

M02

Phishing + initial access against your mail stack

M03

EDR evasion tuned to your actual EDR product

M04

Lateral movement in your network topology

M05

Cloud abuse against your cloud tenant

M06

Web/API exploitation against your internal apps

M07

Post-exploitation, persistence, and exfil

M08

Report writing + purple-team debrief facilitation

[ STUB — expand with duration, cohort sizes, pre-reqs, and recent case study per 05-content-matrix.md §6.1 ]

Plan the programme