Skip to main content

Raider 501: Edge Network Compromises

  • Duration: 16 hours
  • Delivery Options: Online, In-person, Hybrid

Learn and practice offensive cybersecurity skills through three scenarios of varying difficulty; one easy, one medium, and one hard. Use common red team tools to train for edge network attack techniques.

Who should take this course

RAID-501 is designed for cyber and information security professionals interested in offensive cyber skills and roles such as pen tester. It is recommended that participants have at least three to five years of cybersecurity experience or completed the CORE-140 and DEF series.

How can you take this course


Available online live with an instructor


Available in-person either at Purdue or at your location.


Available as a combination of online and in-person

What tools you will use

Participants will use Kali Linux and the tools available for information gathering, exploitation, sniffing, and reporting.

What you can expect from Raider 501: Edge Network Compromises

The best defense is a stronger offense. RAID-501 introduces learners to offensive cyber tactics and network penetration strategies. Participants will have to navigate three attack scenarios in which they will learn to identify and exploit vulnerabilities, along with conveying findings as a report. The range instructor can provide debriefing and additional details on the specific scenarios.  

Key Takeaways

For Organizations:

  • Upskill current workforce  
  • Get hands-on with industry tools in virtual labs.
  • Harden defenses by finding exploits first.

For Individuals:

  • Gain an understanding of network traffic.
  • Learn industry tools in virtual labs.
  • Taught remotely or in-person


RAID-501 is designed for cybersecurity teams but can also be taken as an individual skill challenge. The course is taught through three Purdue Cyber Range scenarios with a debriefing by a range instructor over the course of two days.  

Purdue Cyber Range is a virtual testing ground that allows individuals and teams to experience both defensive and offensive cyberattack scenarios. Each scenario is overseen by a Range Master, ensuring your team's experience is as educational as possible. 

Course Topics

Offensive Tactics: Understand and identify vulnerabilities in web applications, networks, and databases.   

Attack Scenarios: Properly form and implement multi-step attacks by using scripts and brute force.

Reporting: Accurately provide findings to both technical and non-technical teams.  

Tech Requirements

It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.

Are you interested in learning more?

cyberTAP's comprehensive approach to teaching cyber fundamentals and building practical skills through applied technical training is perfect for those interested in starting a new career, learning a new skill, experiencing a cyberattack firsthand, or making a team around cybersecurity. Our programs are fully customizable to offer a tailored solution for individual and corporate needs. Let's get in touch and see just how cyberTAP can partner with you and develop a training program just for you and your team. 

Get Started

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at