RedTeam: Introduction.

Please purchase the course before starting the lesson.

Introduction The red team is known as the fictitious attacker, is responsible for exploiting the vulnerabilities, their behavior is aggressive and has an infinite number of tools to perform all kinds of tests. Learning Objectives: Know the main functions of Red Team. See some of the tools used by the Red Team. The Red Team [...]

Back to: Red & Blue Team > Red Team