top of page
hmlogo_edited_edited.jpg

Professional TIBER Red Teaming

cyberchess_edited.jpg

About The Course

Learn how to prepare, plan and perform professional Red Teaming and Hybrid Security Testing based on relevant threat intelligence, either as an internal team inside your own organisation, or as a service. Suitable for anyone that wants to become a red teaming professional.

In this course you will learn

Planning

Master the strategic groundwork by creating a test plan, defining scope, establishing rules of engagement, and developing a tailored approach for effective red team operations following the TIBER framework.

Reconnaisance

Hone the skills to collect and analyze critical data, identify vulnerabilities, and map out potential attack vectors while ensuring the right amount of information is known by the simulated threat actors.

Attack & Exploit

Learn to simulate realistic cyber attacks using advanced techniques and tools that mirror real-world adversaries while staying aligned with the TIBER defined TI defined objectives.

Reporting

Develop the ability to compile the relevant data for TIBER and create a report with clear, actionable insights and recommendations that drive continuous security improvement.

Laptop Keyboard

Who is this course for?

Anyone that wants to get into red teaming, learn how to perform TIBER or Threat Intelligence aligned hybrid security tests and expand from being merely an operator or whoever wants to learn how to perform and organize professional red team tests, either  internally or as a service.

Location

On site or remote

Max. Attendees

10

Language

English

Duration

1 day

Course Details

Syllabus

  • Introduction to hybrid testing
  • Introduction to the TIBER framework
  • ​Selecting & Processing Threat Intelligence
  • Creating Red Team Scenarios while managing risk
  • The rules of hybrid test scenarios
  • Metrics, trophies, dechaining and risk models
  • Recruit your red team for internal and external parties
  • Setting up red teaming infrastructure
  • Scopes and constraints
  • Legal aspects and protecting stake holders
  • Attack stages in detail
  • Stealth & persistence
  • Decisions during testing: dealing with change
  • Reporting and recommendations for IT and leadership
  • Demos and quizes
  • Your questions
Video Game

Your Instructor

A cyber security industry authority and ethical hacker with over 23 years of authentic cyber security consultancy - at your service.

point.jpg

Tom Van de Wiele

Ethical Hacker | Lead Advisor | Founder Hacker Minded

bottom of page