Training Objectives
Full Course Abstract
What to bring?
Training Prerequisite
Who should attend?
What will attendees get?
Trainer Bio
Training Title:
AdversaryOps: Engineering Red Team Tradecraft
Training Schedule:
Start Date: 10 September 2025
End Date: 11 September 2025
Training Objectives:
In today’s landscape of escalating ransomware attacks and targeted breaches, even the most security-conscious enterprises can overlook critical gaps in control configuration and visibility. This training is designed to bridge that gap.
AdversaryOps dives deep into how modern threat actors operate, not just what they do, but how they do it silently under the radar. You'll learn how advanced adversaries bypass hardened, patched, and well-monitored environments using real-world TTPs (Tactics, Techniques, and Procedures). The training also equips you to evaluate and challenge enterprise-grade security controls by developing and deploying your own stealthy offensive tooling and infrastructure.
Whether you are simulating advanced attacks or assessing your own environment’s resilience, this training provides the tradecraft, mindset, and tooling to operate like a real adversary.
Full Course Abstract:
Day 1 (Red Team Resource Development)
- • Enterprise Security Controls
- • Resource Development
- • C2 & Server-less Re-director Setup (AWS / Azure)
- • Operational Security
- • Working Initial Access Attack Vectors
- • Bypassing Initial Security Controls (Proxy, DNS, Sandbox)
- • .NET 3 Serialization with Initial Access TTP [1 Exercise]
Day 2 (Tradecraft Development for Offensive Operations)
- • APT29 Initial Access [1 Exercise]
- • CSharp Essentials [4 Hands-on Labs]
- • Offensive C# Trade-Craft [3 Hands-on Labs]
- • Windows API Essentials
- • Utilizing Windows API for Red Team Profit [3 Hands-on Lab]
What to bring?
- • A Windows / Linux system with at least 16GB RAM having a VMWare workstation installed
- • Virtual Linux Box [Parrot] With Internet Connectivity
- • If you have AWS Cloud account would be good (not mandatory)
(The team will share updated documentation 1 week prior to the training date.)
Training Prerequisite:
- • Comfortable with command line environment
- • Fair knowledge of Penetration Testing Methodology
Who should attend?
- • Penetration Testers / Red Teams
- • System Administrators
- • Malware Developers
- • SOC analysts
- • Threat Hunting Team
Last but not least, anyone who is interested in strengthening their offensive and detection capabilities
What will attendees get?
Virtual machine infrastructure provided by trainers, all course material including commands, slides, and enterprise lab walk-through, 10 days full challenge lab access with technical support during and after the training class.
Trainer Bio:
Manish Gupta
Manish Gupta is the CEO of CyberWarFare Labs, with over a decade of expertise in offensive and defensive cybersecurity across multi-cloud and on-premise environments. A seasoned leader, he has managed and scaled security teams at global enterprises like Microsoft, Citrix, and Grab, driving robust security strategies and threat mitigation. His experience bridging technical execution and executive leadership positions him as a key influencer in shaping modern cybersecurity practices. Connect with him on LinkedIn for insights into cutting-edge cybersecurity research.
Yash Bharadwaj
Yash Bharadwaj is a seasoned technologist with over 7.5 years of experience, currently serving as the Technical Director & Head of R&D at CyberWarfare Labs. Passionate about offensive security, he specializes in uncovering and analyzing emerging TTPs, building Red/Blue team infrastructure and simulating Identity Based Attacks. A sought-after speaker, he has conducted hands-on training & delivered talks at prestigious conferences such as BlackHat (USA, Asia, EU), Nullcon, X33fCon, NorthSec, and various BSides chapters. A recognized thought leader, he combines technical depth with business-aligned security leadership.