We are committed to providing a safe learning environment in close cooperation with the location(s). All of our services are carried out in accordance with the applicable measures as determined by RIVM. For on-site training the number of participants per training is limited, taking into account the capacity of the rooms so that keeping sufficient distance (minimum of 1.5 meters) is guaranteed. Participants of the training are requested to adhere to the prescribed hygiene measures at site. Also, we request you to stay home if you have a cold and/or when members of your household have a fever.
The Red Teaming Operations course will offer you an unique perspective on how to employ offensive hacking techniques to emulate real world threats against physical and technological environments within an organisation to test resilience and awareness.
You will learn about techniques to infiltrate secure locations of an organization, access their computer network, perform lateral movement in the network, privilege escalation, tunnelling and detection avoidance.
Introduction to Red Teaming Operations (RTO) – Day 1 & 2
During the Introduction to Red Teaming Operations (RTO) we will focus on methodologies and planning that are required to perform a successful Red Teaming operation. We will run a number of practical exercises focused on boosting your skillset in open source intelligence (OSINT), reconnaissance, social engineering and exploitation of physical security weaknesses.
Register here for 2 days Introduction to Red Teaming Operations (RTO).
What happens once an attacker gains an initial foothold into your organisation? During the last three days of training, we will focus on tactical network exploitation techniques. You will practice what you learned in a simulated network, which contains everything you might expect in a real corporate network, trying to achieve a set of realistic objectives while avoiding detection.
Register here for 3 days Tactical Network Exploitation (TNE).
Register here for the full 5-day course.
• Practical hacking experience (e.g.: HackLab: Hands-On Hacking, OSCP, GPEN, etc.);
• Knowledge of Linux and computer networking.
For now, due to COVID-19, we offer this as an online training. We will keep you informed on this matter. The course day starts at 9.00 and ends at 17.00.
Dates 2-day Introduction to Red Teaming Operations
15 & 16 November 2021 | Classroom
6 & 7 June 2022 | Classroom
Dates 3-day Tactical Network Exploitation
17 - 19 November 2021 | Classroom
6 - 8 June 2022 | Classroom
Dates full 5-day course
15 - 19 November 2021 | Classroom
6 - 10 June 2022 | Classroom
For the virtual session we will use "Zoom". The Zoom environment that Deloitte works with is encrypted with a password and the environment is accessible via a participation link.
Therefore, it is not necessary to install any software to participate in the session.
Within Deloitte Netherlands, we have conducted our own confidentiality, privacy and security risk assessments and security measures on Zoom, validating that our Zoom instance is configured in a secure manner and that all risky functionalities have been disabled.
The costs are € 1250 ex VAT for the 2-day Introduction to Red Teaming Operations (RTO) course.
The costs are € 1750 ex VAT for the 3-day Technical Network Exploitation (TNE) course.
The full 5-day course is offered at a discounted price of € 2700 ex VAT.
Deloitte Academy is a training institute accredited by several organizations.
For more information about our accreditation, please refer to our Education hours page.
Until four weeks before the start of the course you may cancel your participation by email free of charge. Should you cancel within four weeks before the start of the course you will have to pay the full course fee.
Deloitte Academy reserves the right to cancel a course if circumstances dictate. You will be informed of this as soon as possible.
For more information about our Terms and Conditions, please refer to our FAQ page.
If you are interested in this course please send us an e-mail. Due to the nature of the information that is used during this course, it is not open to all applicants. Please send your request via e-mail address above, and you will be informed accordingly.
A laptop with virtualization enabled is required (e.g. pre-installed VMware/VirtualBox and a Kali Linux virtual machine). Please send us an email if you are not able to bring your own laptop so we can provide one for the entire duration of the course.
If you have any questions, please contact us:
Phone number: 088-288 93 33
'The practical hands-on of the course is really nice. Putting theory into practice throughout the course.’
‘Experienced facilitators providing good guidance, good location, well organized.'
‘Good Red Team introduction, covering both OSINT, SE and technical attacks.’
Cedric Van Bockhaven
Cedric works as a Red Team Operator in the Deloitte Cyber Secure team and performs projects across all sectors. He provides both internal and external trainings with a heavy focus on the technical side of security topics. Hackazon (Deloitte’s Capture the Flag platform) is Cedric’s creative outlet to create new technical hands-on cyber security exercises that can be solved participants. Cedric also organizes and facilitates these events. Cedric is a certified CISSP, GICSP, OSCP, OSCE, and followed trainings such as Corelan ADVANCED.
Cas van Cooten
Cas van Cooten is a Red Team Specialist in the Cyber Secure team of Deloitte Netherlands' Cyber Risk Services practice. He has an international mindset and a strong affinity with the technical, human, and strategic aspects of cyber security. Cas is a proficient penetration tester and has extensive experience with running red team operations, including TIBER and CBEST. He is energized by placing offensive security engagements in a broader organizational context and sharing knowledge on a broad range of security-related topics. Cas is actively involved in the broader information security community by performing and sharing security research on his blog, organizing trainings for national initiatives such as Challenge the Cyber, and developing content for platforms such as HackTheBox.