Red Team Operations Training Boot Camp

Do good by being bad in this exclusive Red Team Operations course designed to teach you to think like a cybercriminal, help you better defend your organization, and prepare you for the Certified Red Team Operations Professional exam.

Award-Winning Training

For 20 years InfoSec has been one of the most awarded and trusted information security training vendors — 40+ industry awards!

Exam Pass Guarantee

We offer peace of mind with our Exam Pass Guarantee for Flex Pro students.

Track Record of Success

Infosec training courses have received 10,000+ 5-star reviews from our students!

Red Team Operations Course Overview

“Know your enemy, and know yourself.” Sun Tzu’s most famous advice from The Art of War still applies in the 21st century, and on the digital battlefield, knowing your enemy is more important than ever. So put on your black hat and get ready for Infosec’s groundbreaking Red Team Operations boot camp!

In our exclusive Red Team Operations course, you’ll learn to defend against hacking and fraud attacks on your organization — from network vulnerabilities to social-engineering tactics. And you’ll learn from the attacking side! Our experienced instructors will lead you through the basics of multiple cybercrime assaults and show you how you can use these techniques to improve security at your own organization.

Ethical, legal and no-holds-barred, Infosec is proud to offer the Red Team Operations boot camp. Earn your Certified Red Team Operations Professional (CRTOP) certification and, just for one course, do good by doing bad.

Red Team, Blue Team — or Both?

Learn to attack and think like a criminal in this exclusive Red Team Operations course.

Learn to identify, hunt down and analyze threats in its sister course, Cyber Threat Hunting. When combined, you’ll have both an offensive and defensive understanding of security — and a more holistic view of the cyber threat landscape.

Award-winning training that you can trust.

Outstanding Partnership Award

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

Watch List Company

Top Online Learning Library

The Most Flexible Training — Guaranteed

Exam Pass Guarantee — If you don’t pass your exam on the first attempt, get a second attempt for free; includes the ability to re-sit the course for free for up to one year

100% Satisfaction Guarantee — If you’re not 100% satisfied with your training at the end of the first day, you may enroll in a different Flex Pro or Flex Classroom course

Knowledge Transfer Guarantee — If an employee leaves within three months of obtaining certification, Infosec will train a different employee at the same organization tuition-free for up to one year

What Will You Learn in this Course?

After attending the Red Team Operations boot camp, you will have sufficient knowledge and skills to be able to:

  • Thoroughly understand and apply a variety of passive and active intelligence-gathering techniques
  • Discover and leverage vulnerabilities in physical and network infrastructure
  • Select and effectively use social engineering techniques, from phishing to phone to face-to-face
  • Gain entry into a target location using various covert and overt methods
  • Test and evade all types of the security control types: logical, physical and administrative
  • Perform a comprehensive Red Team Operation penetration test, from reconnaissance to establishing a foothold and maintaining a covert presence
  • Earn a valuable CRTOP certification

What's Included?

  • Red Team Operations boot camp – 5 days
  • Infosec custom digital CRTOP courseware (physical textbooks available to purchase)
  • CRTOP exam voucher
  • Detailed reporting on exam readiness via your Flex Center (Flex Pro)
  • 100% Satisfaction Guarantee
  • Exam Pass Guarantee (Flex Pro)
  • Add-on: Video replays of daily lessons

Who Should Attend?

  • - Red Team members and offensive security specialists

  • - Penetration testers, security researchers and ethical hackers

  • - Incident responders

  • - CISOs and security managers

  • - Security and networks architects, engineers and administrators

  • - Any professionals whose responsibilities include physical and information security

Hands-on Labs and Exercises

Our practical exercises are designed to make you feel like a part of a real red team operation. Find and exploit network vulnerabilities in our intuitive virtualized environment configured with popular hacking tools. Bypass physical controls with a professional-grade lockpick set (yours to keep). Hone your social engineering skills by crafting convincing phishing emails and running a real phishing campaign against your classmates, friends or family members using an industry-leading phishing simulator.

Infosec Flex Center: Your Personalized Learning Experience

Learn More

Why Choose Infosec?

Industry-Leading Exam Pass Rates — 93% of our students pass their certification exams on their first attempt

Training to Fit Your Schedule — In addition to Flex Pro, the highest-quality live online training in the industry, Infosec offers Flex Classroom training around the country and learn-at-your-own pace Flex Basic courses

Experienced Instructors — Infosec instructors have at least 10 years of industry training experience and are professionals with active roles in the industry

Most Thorough Exam Prep Services Available — Students get free exam readiness testing through as well as advanced access to all course materials

CRTOP Certification Details

The IACRB Certified Red Team Operations Professional (CRTOP) is designed to certify that candidates have the expert-level knowledge to perform a comprehensive red team assessment.

The CRTOP body of knowledge consists of seven domains covering the responsibilities of a red team member. The certification exam is a 50-question, traditional multiple-choice test. Questions are randomly pulled from a master list and must be completed in two hours. The seven CRTOP domains are:

  1. Red team roles and responsibilities
  2. Red team assessment methodology
  3. Physical reconnaissance tools and techniques
  4. Digital reconnaissance tools and techniques
  5. Vulnerability identification and mapping
  6. Social engineering
  7. Red team assessment reporting

A 70% is the passing score for the CRTOP exam.


  • Understanding of fundamental information security concepts
  • Professional exposure to penetration testing methodologies and tools
  • Basic understanding of networking concepts
  • Firm understanding of the Windows Operating System
  • Exposure to the Linux Operating System or other Unix-based OS
  • Desire to learn about pentesting and red teaming, stay ethical and get great security training!

What Our Students Are Saying

Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.

John Hollan GE

Advanced Ethical Hacking Training Boot Camp

Our Major Clients

Red Team Operations Course Syllabus

    Our instructors give you 100% of their time and dedication to ensure that your time is well spent. You receive an immersive experience with no distractions! The typical daily schedule is:

    • Module 1 — Introduction to red team operations
      • Course introduction
      • Types of security assessments
      • What is red teaming?
      • Role of red team in organizational security programs
      • Red team vs. blue team
      • Red team assessment phases
      • Red teaming methodology
      • Planning red team operations
    •  Module 2 — Red team assessment phases: setting objectives
      • Defining assessment methodology and objectives
      • Identifying points of contact
      • Analyzing initial information
      • Gathering team and equipment
    •  Module 3 — Red team assessment phases: reconnaissance
      • Passive intelligence gathering and OSINT
      • Physical recon
      • Getting started with social engineering
      • Social engineering tactics
      • Pretexting
      • Phishing, vishing, smishing
      • Physical and digital surveillance
      • Wireless recon
      • DNS and SNMP recon
      • Identifying possible attack vectors
    • Module 4 — Red team assessment phases: target identification
      • Identifying physical controls and vulnerabilities
      • Passive network discovery and scanning
      • TCP scanning
      • Scanning through firewalls
      • Stealthy scanning techniques
      • Idle scanning
      • Avoiding IDS/IPS detection
      • Proper identification of services
      • Vulnerability identification
      • Types of network and application vulnerabilities
    • Module 5 — Red team assessment phases: gaining access
      • Covert and overt entry
      • Evading surveillance and physical IDS
      • Lock picking
      • RFID cloning
      • Using social engineering to gain entry
      • Vulnerability mapping
      • Types of exploits
      • Client-side exploits
      • Password attacks
      • Exploiting flaws in encryption
      • Attacking web application
      • Wireless hacking
    • Module 6 — Red team assessment phases: establishing foothold and maintaining presence
      • Avoiding anti-virus detection
      • Use of Trojans
      • Hardware and software keyloggers
      • Installing rogue access points and network TAPs
      • Port redirection and other anti-firewall techniques
      • IDS operations and avoidance
      • Internal recon and pivoting
      • Encrypting your communications
      • Protocol abuse for covert communications
      • Creating custom encryption tunneling applications
    • Module 7— Red team assessment phases: completing objectives
      • Identifying and extracting target data
      • SQL data extraction
      • Sniffing network traffic
      • Exploiting targets of opportunity
      • Anti-forensics
      • Log modification/deletion
      • Rootkits
      • Communication and evidence management
    • Module 8 — Red team assessment phases: reporting
      • Report structure and content
      • Reporting for compliance
      • Providing recommendations
      • Presenting your findings
    • Module 9 — Additional red team operations resources
      • Red team operations best practices
      • Commercial and open-source tools
      • The future of red team operations

    View Pricing

    We will never share any of your information, spam you or annoy you with pushy sales pitches.

    Book your course

      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing