Skip to content


Learn how to carry out a red team from start to finish; setting up the attack environment, carrying out intelligence gathering, creating and running phishing campaigns, deploying implants, doing internal network reconnaissance, finding sensitive files and escalating access all the way to Domain Administrator. At the end of this course attendees will be able to carry out a complete red team test.

Course Outline

Topics include:

  • Scanning and planning attacks
  • Remotely attacking Linux systems
  • Service information disclosure
  • UNIX fundamentals
  • Crafting packets
  • Solaris systems
  • Server configuration application and weaknesses
  • Database service attacks
  • Shell breakouts
  • Privilege escalation basics and advanced privilege escalation
  • Compiling and running exploits
  • End of course “Capture the Flag”

Course Details

Duration: 3-4 days

Who should attend: Recommended for experienced security practitioners, defensive or offensive, with at least 3 years experience in Windows security. Senior Security Personnel, Senior Penetration Testers, CISOs, Security Incident Responders

Prerequisite: No prerequisites are mandated for this course

Accreditation: National accreditation is currently not available for this course

Trainer: Presented by experienced cyber security practioners from ContextIS and delivered with local relevant content

Terms and conditions

How to register for this course

Simply fill out one of the below Course Registration Forms and return via email to

Contact us

For more information on our courses or for general enquires please complete this form. Alternatively you can contact us via the following contact information:

Babcock Training Academy

Level 9
70 Franklin Street
Adelaide  SA  5000

tel:  +61 8 8440 1498