Raider 601: Internal Network Compromises
- Duration: 16 hours
- Delivery Options: Online, In-person, Hybrid
Learn and practice offensive cybersecurity skills through three “hard” scenarios. Use common red team tools to train for internal network attack techniques
Who should take this course
RAID-601 is designed for cyber and information security professionals interested in offensive cyber skills and roles such as pen tester. It is recommended that participants have at least three to five years of cybersecurity experience or completed the RAID-501.
How can you take this course
Available online live with an instructor
Available in-person either at Purdue or at your location.
Available as a combination of online and in-person
What tools you will use
Participants will use Kali Linux and the tools available for information gathering, exploitation, sniffing, and reporting.
What you can expect from Raider 601: Internal Network Compromises
RAID-601 builds on the offensive cyber tactics and network penetration strategies introduced in RAID-501. Participants will have to navigate three challenging attack scenarios in which they will learn to identify and exploit vulnerabilities, along with conveying findings as a report. The range instructor can provide debriefing and additional details on the specific scenarios.
- Upskill current workforce
- Get hands-on with industry tools in virtual labs.
- Harden defenses by finding exploits first.
- Gain an understanding of network traffic.
- Learn industry tools in virtual labs.
- Taught remotely or in-person
RAID-601 is designed for cybersecurity teams but can also be taken as an individual skill challenge. The course is taught through three Purdue Cyber Range scenarios with a debriefing by a range instructor over the course of two days.
Purdue Cyber Range is a virtual testing ground that allows individuals and teams to experience both defensive and offensive cyberattack scenarios. Each scenario is overseen by a Range Master, ensuring your team's experience is as educational as possible.
Advanced Offensive Tactics: Understand vulnerabilities and how to exploit and traverse complex networks and databases.
Attack Scenarios: Properly form and implement multi-step attacks for intrusion, exfiltration, and decryption of data by using scripts.
Reporting: Accurately provide findings to both technical and non-technical teams.
It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.