Applications

Specialisation Course “Cybersecurity – Red Team”: Applications are open until 10 March

The Cybersecurity – Red Team course equips participants with the skills to strengthen and enhance a company’s cybersecurity systems. It provides a significant advantage for those seeking to stand out in the job market or within their organization.

The recent surge in cyberattacks has highlighted that all companies have vulnerabilities that must be addressed, emphasising the need for qualified professionals to respond to growing threats. An offensive cybersecurity professional (Red Team) tests an organization’s defenses by simulating attacks and exposing security weaknesses. Red Team members contribute to strengthening and improving a company’s cybersecurity systems by demonstrating the impact of successful attacks and identifying cybersecurity practices that need improvement or reinforcement. Acquiring these skills is a valuable asset for anyone aiming to excel in the job market or advance their career within their organization.

The Cybersecurity – Red Team course provides participants with the tools, techniques, and methodologies most commonly used to execute cyberattacks against various systems (e.g., Firewalls, IDS, IPS). This includes employing different methods such as deploying a Command & Control server for mass attacks and testing in various environments, including local machines and web applications. The course is mandatory and is part of the CyberSec Specialisation Programme. This edition will be delivered remotely via Zoom.

Objectives:

  • Understand the most common tactics employed by cyber attackers, covering the full attack lifecycle across various cyberattacks;
  • Learn the most common techniques to bypass defensive systems (e.g., Firewalls, IDS, IPS) and understand how to set up a Command & Control server for mass attacks;
  • Execute attacks in various environments, including local machines, web applications, wireless networks, and through social engineering methods;
  • Gather information to identify the target’s attack surface, enumerate and map various threats, develop exploits to exploit vulnerabilities, and execute and understand the most common post-exploitation techniques.

 Information about the course:

Start date: 24 March 2025
End date: 5 May 2025
Timetable: Mondays and Thursdays, 6 pm to 9 pm
Price: 1580€
Format: Online
Duration: 36 hours

Early Bird discount 5% until 10 February 2025

More information and applications