Red Teaming Courses, Certifications and Workshops
Learn capabilities to manipulate, deny, disrupt, or degrade targeted computers, information systems, or networks, for both offensive and defensive cyberspace operations.

Red Teaming Fundamentals Master Course
This Master Course teaches a unique approach to penetration testing based on simulating the attack techniques and strategies of real attackers against organizations’ networks for defence purposes.
Red Teaming – The Fundamentals is a basic yet potent introductory course to Red Teaming. You will learn fundamental concepts and strategies that underline every attack campaign.
Read MoreTARGET AUDIENCE
- Penetration Tester
- Red Teamer
- Incident Responder
- Security Engineer
- Forensics Analyst

Phishing and Spear-Phishing Bootcamp
Phishing and spear-phishing are types of cyber attacks that involve tricking victims into clicking malicious links or opening attachments that install malware.
MCSI's bootcamp teaches state-of-the-art phishing and spear-phishing techniques for penetration testing and Red Teaming. The bootcamp covers essential topics such as reconnaissance, social engineering, email spoofing, website cloning, payload creation and defense evasion techniques.
Read MoreTARGET AUDIENCE
- Penetration Tester
- Red Teamer

Dragon-Net Red Team Exercise
Dragon-Net "Red Team Exercise" is an expertly guided hands-on experience conducting simulated real-world attacks against procedurally generated computer networks.
During the mock exercise, MCSI instructors guide students to their target, assisting them to employ concepts and strategies that advanced persistent threats (APTs) use to great effect.
Read MoreTARGET AUDIENCE
- Penetration Tester
- Red Teamer
- Security Engineer
- Incident Responder
- Forensics Analyst

MRT - Certified Red Teamer
An MCSI-certified professional Red Teamer can perform the entire range of Red Team operations.
This certification course emphasizes the creation of bespoke malware to circumvent and avoid enterprise security measures.
To develop offensive security capabilities for all stages of the Kill Chain, you'll acquire a deep understanding of Windows internals and programming.
Read MoreTARGET AUDIENCE
- Red Teamer
- Penetration Tester

Red Teaming Advanced Userland Techniques Master Course
Our Red Teaming “The Advanced User-Land Techniques” course teaches user-land exploitation techniques specifically designed to evade advanced enterprise security products, as well as make incident detection and response a real nightmare.
You will practice against computer networks containing multiple VLANs, properly defended by endpoint detection and response, and defence-in-depth.
Read MoreTARGET AUDIENCE
- Red Teamer
- Penetration Tester
- Incident Responder
- Security Analyst

Windows Kernel Rootkits Techniques and Analysis Master Course
In this Master Course, you will learn how to reverse engineer rootkits, write rootkits, and build your own EDR software for defensive purposes.
This course introduces the Windows architecture and how kernel components work together at the lowest level. We show how rootkits leverage these components for nefarious activities.
Read MoreTARGET AUDIENCE
- Malware Analyst
- Forensic Analyst
- Cyber Operators