The Red Team track focuses on modern offensive techniques used by advanced threat actors and ransomware operators to compromise organizations. Participants will learn how attackers gain initial access, evade defenses, move laterally, and escalate privileges across on-premises, cloud, and SaaS environments—often without deploying traditional malware.
Topics include identity-based attacks, credential and token theft, Kerberos and authentication abuse, living-off-the-land techniques, cloud control-plane compromise, and MFA bypass strategies. The track emphasizes realistic attack chains aligned with modern ransomware operations, rather than isolated exploitation techniques.
Through hands-on labs, adversary emulation exercises, and simulated campaigns, participants will sharpen their ability to think like attackers, validate defensive controls, and provide actionable insights to blue and purple teams. This track equips red teamers to test real-world resilience, expose blind spots, and drive measurable improvements in organizational security posture.