Skip to content

Offensive Security Experts

Customizable solutions to educate clients, identify security risks, inform intelligent business decisions, and enable you to reduce your attack surface digitally, physically and socially.

Red Teaming®

A multi-layered attack simulation designed to measure how well a company’s people and networks, applications, and physical security controls can withstand an attack from an adversary.

Penetration Testing

Inspects your network, application, device, and physical security through the eyes of BOTH a malicious actor and an experienced cybersecurity expert.

Social Engineering

Commonly known as “people hacking,” we aim to identify venerabilities by accessing a system, device, or physical premises.

Is You're Company Compliant?

RedTeam Security are the experts in helping you meet your industry’s security compliance standards, from banking to healthcare, retail and beyond.

PCI Penetration Testing

NERC CIP Compliance

HIPAA Penetration Testing

FDIC Penetration Testing

Cryptocurrency Compliance

Red Team Training & Early Registration Discount

Red Team Training Full Force
Over 15% off the April session for early registrations – REGISTER NOW, offer expires March 14th

Full-Force Red Teaming: Physical Intrusion, Social Engineering, Penetration Testing

Red Teaming Paradigm:
Red Teaming Paradigm: Technical, People & Physical

From the team who brought you, “Hacking the Grid,” we are pleased to offer Full-Force Red Team Training over a 5-day period. Students will be breaking into offices/buildings (legally, of course) while leveraging their newly found skills: lock picking, RFID cloning, door bypassing and camera evasion, etc. They will be social engineering unknowing, but real human targets (in person, by phone, by email) and hacking into computers in our lab environment.

We’ve meticulously crafted a training simulation unlike any other, that mirrors a full Red Team Operation as close to real life as possible — lifted from our own professional exploits (Link 1, Link 2, Link 3, Link 4, Link 5).

Real Targets. Real People. Training With a Plot and a Purpose.

Onsite Redteaming
Redteam Scouring An Actual Target’s Desk For Sensitive Documents

We have created a simulated world with a fake Critical Infrastructure energy company complete with employee profiles, real phone numbers, real email addresses, real social media accounts and real physical offices to make this training as realistic as possible. To add to the realism, some unknowing participants (targets) will be involved. The students’ goal is to conduct a Red Team Operation in an effort to compromise the target company via three (3) domains:  Technically, Socially and Physically. Each of the three domains of the operation, if carried out successfully, will provide enough information to advance to the next domain. Each domain requires the student to pass a series of security challenges. If they reach the final domain, physical access, they must solve physical security challenges to get physical access the objective, “the big red button,” located inside a secure office. There is no security training like this available anywhere.

Red Team Training Syllabus

Red Team Training Syllabus
Red Team Training Syllabus

Have a deeper look into the day by day training breakdown. Four of the five days involves full-training exercises (FTX). Students put into practice what they learn throughout the day’s lectures via a capture the flag approach. They become fully immersed in this engaging 5-day session.

Click here to view the training syllabus and register today!

Why?

To arm, educate and ‘level up’ the next generation of penetration testers, red teamers, blue teamers and all around security professionals. White hats are losing this game. We all need something more.

Highlights
  • Covert entry exercise on a real physical office (pretext planning and execution, lock picking, etc)
  • Penetration testing for red team operations (adjacent attack surface planning)
  • System exploitation, web app exploitation, pivoting, information gathering, etc.
  • Social engineering real human targets (face-to-face, spear phishing, telephone)
  • Capture-the-flag (CTF) approach (physical flags, social flags, digital flags)
  • Hosted in St. Paul, MN at Union Depot in the Gateway Room
  • Realistic story plot is interwoven into the entire operation
  • 5-days long with 8 hour days
Over 15% off the April session for early registrations – REGISTER NOW, offer expires March 14th

Details and registration information are available here.

10-Point Offensive Security Checklist

Get A Bird's Eye View Of Your Organization's Security Readiness

Services Datasheet

Recent Posts

Featured On

National TV news and media outlets often consult with us for our expertise as a
boutique, high-touch ethical hacking firm highly trained in a narrow field of cyber
security. Please click on any logo below to view the featured story.