An MCSI qualified professional Red Teamer is capable of delivering the full gamut of Red Team operations.
This course focuses heavily on custom malware development to bypass and evade enterprise security solutions.
Individuals who hold the MRT Certification from MCSI can apply for Red Teamer jobs worldwide with the confidence that they have the competencies that the industry is seeking.
MCSI Certifications are world-class. The content is cutting-edge, uniquely-designed, hands-on and challenging. Our exercises teach in-demand skills that are immediately applicable in the field. MCSI's unique approach helps students around the world advance their careers.
This Certification has no expiry date. It has no renewal fees, no hidden fees, and is accessible with no time limits.
MCSI Certified Red Teamer:
Deep knowledge of Windows internals
Perform security research and come up with new attack techniques and tactics
Write and maintain their own attack toolkits
Think outside the box and come up with new attack vectors and approaches
Design, propose, and safely execute multifaceted Red Team operations that amaze customers
Concepts - 3 exercises
Lab Setup - 3 exercises
Initial Access - 8 exercises
Execution - 13 exercises
Persistence - 10 exercises
Privilege Escalation - 11 exercises
Anti Behavioral Analysis - 3 exercises
Anti Static Analysis - 4 exercises
Defence Evasion - 13 exercises
Credential Access - 8 exercises
Discovery - 7 exercises
Lateral Movement - 4 exercises
Collection - 5 exercises
Command and Control - 9 exercises
Documentation / Process - 3 exercises
Operation Artic Winter - 3 exercises
Operation Desert Sandworm - 10 exercises
Below are three (3) exercises from the 100+ exercises available in MRT - Certified Red Teamer:
Write a TCP Reverse-Shell As A Windows Executable (Novice)
Write Malware That Disables Windows Defender, Bitlocker, Error Reporting, And The Local Firewall (Advanced Beginner)
Ability to comfortably read and understand IT documentation written in English. Ideally, an IELTS score of 6.5 with no band less than 6 (or equivalent).
Note: You can register for this course without having undertaken an English test.
We recommend that you have some experience in software programming prior to registering for this course.
The preferred programming languages for this course include: Python, PowerShell, C and Golang.
Here's a list of things for you to confirm whether you're at the right level:
Write basic scripts in Python and/or PowerShell, or something equivalent
Write Windows programs using a compiled programming language such as, but not limited to, C/C++ or Golang
Be comfortable with command line utilities and tools
Be capable of installing Windows and Linux virtual machines in something like VirtualBox
Have some experience troubleshooting and resolving software errors
Frequently Asked Questions
What is the MCSI Method™?
Are solutions included in certifications and bundles?
No. Our method of teaching cyber security consists of challenging you with real-world problem statements that you're expected to research and solve by doing your own research. This is how you'll be expected to work in the field. When you fail an exercise, we provide you with constructive feedback to improve and try again.
Do the videos provides the answers to exercises?
No. The videos teach concepts, mindset, methodologies, procedures and professional skills such as report writing, interviewing and preparing proposals.
Do bundles or certificates ever expire? Am I expected to buy again in the future?
Once purchased, bundles and certificates are unlocked forever. They are no recurring or ongoing fees.
Do you offer any special offers and discounts?
If I can't solve the exercise where do I go for help?
We have an online forum where you can ask questions and our team of professional instructors will help you out.
An `Unofficial Curriculum` contains MCSI's practical exercises aligned to a non-MCSI Industry Certification syllabus.
We offer unofficial curriculums for the OSCP, ISACA CISA, ISACA CISM, ISACA CRISC, CCT ICE, CCSAS, CCT ACE.
Do you provide Continuing Professional Education (CPE) credits?
Yes. Every single exercise offers CPE credits. The number of credits earned depends on the difficulty of the exercise completed. Below are the CPE Credits achieve for an exercise in each difficulty:
Novice exercises = 1 CPE credits
Advanced Beginner exercises = 2 CPE credits
Competent exercises = 5 CPE credits
Proficient exercises= 8 CPE credits
Beyond Proficient exercises = 16 CPE credits
Are MCSI courses/certifications recognized and have value outside of Australia?
Yes. MCSI certifications have value worldwide and are recognized by employers looking for individuals with practical cyber security skills.
MCSI's training is 100% practical with real cybersecurity problems designed to teach immediately applicable skills in the field. To solve our practical exercises, students must do their own research and develop their own solutions.
While completing exercises, students also develop their own comprehensive cybersecurity portfolio of skills. Individuals use this portfolio to demonstrate their cybersecurity competencies to solve real industry problems to future employers or hiring managers.
Do I need to complete an exam to receive MCSI Certification?
No. MCSI Certifications are completed by solving practical cybersecurity exercises.
This certification successfully prepares you for the following
Offensive Security Consultant
Senior Penetration Tester
Training Curriculum and Certifications
Students unlock Certificates of Completion for every exercise they complete. Industry Certifications are unlocked upon achieving Skills Proficiency Milestones.
Obtain CPE points by solving exercises
Achieve multiple certifications
Receive help from instructors online
MCSI's MRT certification covers all six levels of the Australian Signals Directorate's Cyber Skills Framework. You will achieve a certificate upon reaching each level. You will earn an industry certification at Level 5. Click here to learn more.
ASD Skills Proficiency Level
Curriculum Completion Requirement
Scenarios Completion Requirement
MCSI Red Team Learner
MCSI Novice Red Teamer
MCSI Red Team Practitioner
MCSI Senior Red Team Practitioner
MCSI Certified Principal Red Team Practitioner
MCSI Certified Expert Red Teamer Practitioner
As an MCSI Certified Red Teamer you will be fully capable of performing the following:
Write custom malware for unconventional Red Teaming operations against Windows environments. For example:
Use unconventional Red Team tactics and strategies:
Have a wide arsenal of known techniques for every stage of the attack chain:
Command and Control
Write custom attack tools in some of the following programming languages:
Write Red Teaming proposals and reports that delight customers
We have a Red Team with 12 people and needed a method that was cost-effective to ensure everyone was receiving the same practical training. We purchased the MRT for each team member and received resounding feedback internally and observed positive, measurable results immediately. One of the biggest positives is the MRT also saves the company a significant amount from our training budget.
Red Team Lead, Financial Services
I have been working in offensive security for 15+ years and enrolled in the MRT so I can continue learning Red Teaming online. I was amazed at the content from the beginning. The training is completely hands-on and includes incredibly advanced Red Teaming skills which are just what I was looking for.
Senior Red Teamer, Financial Services
Fantastic! I manage a Red Team of 8 people, and our attack campaigns have become more successful since we started working through the MRT. The practical, yet relevantly challenging training prepares and sharpens the team’s skills, measuring up for exactly what they will be doing as part of the next project.
Red Team Manager, Consulting Services
Why MCSI’s Red Teamer Certification is World Class
Comprehensive, Effective, Exceeds Standards
Holders of the MRT Certification have completed 100 practical online exercises thus demonstrating that they have the skills and knowledge required to deliver Red Team operations and write custom Red Team tools. Students take an average of 6 months to complete these exercises.
Students who have obtained this Certification have demonstrated that they have a full understanding of the internals of Windows as applied to Red Teaming. This Certification focuses on the operating system vulnerabilities that are inherent to software architecture and design decisions made in the 90s and 2000s that continue to exist to this day.
The challenges that students have had to overcome successfully in order to obtain this Certification have required them to write software in C/C++, Golang, and Python. This guarantees that Red Teamers certified by MCSI can write custom tools capable of defeating enterprise security products.