SOFNET
Certified Red Team Professional
(CRTP)
Organizations are increasingly taking an offensive approach to cybersecurity through simulation of real-word attack scenarios – commonly known as red teaming.
As a Certified Red Team Professional, you will be able to conduct controlled assessments, employing tactics & techniques to implement proactive security measures.
COACH
20+ Years Experience
HYBRID CLASSES
Face-to-Face / Online Classes
DURATION
5 Days
CERTIFICATION BY


HRD CORP REGISTERED TRAINING PROVIDER

HRD CORP CLAIMBABLE
Unleashing Offensive Cybersecurity Mindset & Tactics
Red Teaming plays a pivotal role in fortifying defenses against sophisticated cyber threats. It embodies a proactive and holistic approach, mimicking the tactics used by attackers to evaluate an organization's security strength.
Empowering IT Personnel with in-depth understanding of offensive cybersecurity tactics. Learn to think like a hacker to anticipate and counter potential threats. Practical Hands-On Experience through simulated scenarios and real-world case studies, enabling proactive tackling of cyber challenges.
Practical Hands-On Experience through simulated scenarios and real-world case studies, enabling proactive tackling of cyber challenges.
University-backed Curriculum
Relevant to the Real World Practices
CERTIFICATION OF COMPLETION

BECOME A CYBERSECURITY CRTP ANALYST IN
5 Days
What You’ll Learn
Learn the comprehensive art of Red Teaming to simulate adversary tactics, exploit vulnerabilities, and execute full-spectrum penetration tests for robust cybersecurity assessments.
Preventive & Proactive Security
- MITRE ATT&CK Framework
- Adversary Simulation Fundamentals
- Attack Lifecycle
- Offensive Hacker Mindset
- Vulnerability Discovery & Exploitation
- Post-Exploitation Tasks
- Red Team Penetration Testing
In-Depth Training and Extensive
Cybersecurity Modules
Explore detailed insights into the MITRE ATT&CK Framework, focusing on threat actors’ techniques, tactics, and procedures (TTPs) crucial for Red Teaming.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Security Operations Center (SOC) – Introduction
- Introduction to Red teaming
- Role of red team in organizational security programs
- Red team vs. blue team
- Red team assessment phases
- Red teaming methodology
- Planning red team operations
- Attack Lab Infrastructure
- Threat Intelligence: Frameworks, Platforms, and Feeds
- What is MITRE ATT&CK Framework?
- Tactics, Techniques and Procedures (TTP)
- Indicators of Compromise (IoC) and Indicators of Attack (IoA)
- Mapping to ATT&CK from Raw Data : 2 Hands-on Labs on Real world attack logs
Pioneering Over 20-Years Of IT
Expertise & Cybersecurity

Meet Dr. Clement Arul
Dr. Clement Arul is a seasoned IT professional with 20- years of experience, specializing in cybersecurity framework, ethical hacking, security risk & governance, big data, IoT, systems analysis (design, development, secure coding, implementation), digital forensics, and project management. He has made significant contributions to national cybersecurity frameworks and has collaborated with multiple ASEAN governments to develop and implement their cybersecurity strategies. Dr. Arul’s expertise is widely recognized, with his active participation in 600+ public conferences across ASEAN in recent years.
Get Funded & Learn New Skills

Our cybersecurity program is fully reimbursable through HRD Corp.
Allows you to gain access to high-quality training at no extra cost!
Take advantage of this financial flexibility to invest in your professional career today.
Our graduate testimonials

Adam Smith
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Jhon Deo
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Maria Mak
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Jackma Kalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Amily Moalin
Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Who this Course is For
Offensive Cybersecurity Specialists: Red teamers, bug bounty hunters, penetration testers, security analysts, vulnerability assessors and security consultants.
Defensive Cybersecurity Specialists: Blue team members, defenders, forensic analysts, and IT security professionals seeking to enhance their understanding of offensive cybersecurity strategies.
Prerequisites: Thorough understanding of penetration tests and security assessments (preferably with Pentest Certifications), networking basics, understanding of different Oses like Windows / Linux, prior knowledge on OWASP TOP 10 and knowledge of Active Directory.
Pricing & Payment Plans
Installments
from as low as
RM 1,750/month
excluding admin fees and 6% SST
*Discounts available for first time self-paying individuals.
Full Tuition
Total
RM 7,500
excluding admin fees and 6% SST
*Discounts available for first time self-paying individuals.
Financing By

Apply To The Next Certified Red Team Professional (CRTP)Course
NEXT COURSE STARTS ON JANUARY 22, 2024
DEADLINE FOR APPLICATION JANUARY 17, 2024
Explore all of our courses
