Or log in to access your purchased courses

Course Description:

As an Infosec professional, planning the cybersecurity tasks in any organization, the common thing is to focus on defensive actions to secure the infrastructures to mitigate or reduce the impact of any threat. But in this process, an essential task is to ask ourselves; Are we planning defensive activities to protect ourselves correctly? Protection against “what”?, This is where we, have to think “outside of the box”, and put ourselves in the “eyes of the beholder”, to study, and analyze all possible outcomes in which any target can be compromised, and then, give a proper response to protect it against cyber threats.

This can be achieved by running simulated attacks, engagements between the security staff divided into 2 teams. One team will use all available tools to find a vulnerability in the system under scrutiny (Red Team), followed by the simulation of a proper response, by the second team (Blue Team).

In information security (INFOSEC), the exercise is designed to identify vulnerabilities and find security holes in the security infrastructure in the organization. They are also used to assess and train security personnel.

Red Team

The Red Team are the fictitious attackers, they are the offensive cyber guys, this team must be formed by skilled Ethical Hackers, with a lot of experience, capable to emulate any attack, ranging for the simplest to a more complex intrusions into the objective, they are external entities that are presented to test the effectiveness of a security program.

This is achieved by emulating the behaviors and techniques of potential attackers in the most realistic way possible.


The Red Team is always attentive to any vulnerability, and, to launch their attacks, they must use the endless and more up to date tools that are available, and also, their behavior must be aggressive.

They explore potential weaknesses and enforce them in the system, this type of simulations help companies to strengthen their cyber defenses.


  • Footprinting
  • Social engineering
  • Malware implantation
  • Intrusions
  • Lateral movements
  • Privilege escalation
  • Data exfiltration
  • DoS Attacks.

Blue Team:

This group is formed with the vulnerability assessors of the company, that go into the environment and they assure that the scanning, the assistance configuration, that everything “looks” how it’s supposed to look, to have the most secure network infrastructure. This team is responsible for identifying what is the “normal behavior” of a company network and remain alert to discover immediately any possible malicious behavior and act on it.


The blue team must be able to detect the intrusions and stop the red team from achieving their purpose. They must be able to detect exploits quickly enough to prevent the sensitive data exfiltration, DoS attacks and even social engineering attempts.

They also have to ensure that any measure taken against an attack, remains effective after implementation, and to perform forensic analysis to be able to identify the attackers and their “tactics”, in order to improve the “intelligence” about the attacks.


  • Defensive exercise against threats
  • Security updating
  • Bug fixes
  • Security methodologies improvement
  • Security Policies Establishment

Purple Team:

Characteristics and functions

We include this team in here, a team that at this moment is gaining more relevance. It’s a possibility to improve the defense capabilities of any company and a great complement to the Red Team and the Blue Team dynamics. Imagine the possibilities. To be able to give your company a level of security that is higher than any standard set by the Red/Blue team confrontations.

This “Purple Team” would have the task to compile, to set a level of effectiveness never reached before, how to do this? simple, you create a team that combines the Intel obtained from blue team defensive tactics, with the intel of the weaknesses detected in the system by the red team, from every confrontation that they engage in.

General Objective of the course:

Get to know the tools used by this teams for the construction of a work environment that will allow doing research, and analyze, the way in which different threats can affect the computer systems of an organization.

Red Team Tools

  • BloodHound
  • PSAttack
  • Dumpster Fire

Blue Team Tools

  • BlueTeam Toolkit
  • GRR



Other Lessons