• Travel Security Training
  • Red Team Training

      ro-service-tornado_02Travel Security Training

      Travelling employees present a unique opportunity for attackers to obtain business sensitive information from traditionally well-protected organisations. Our Travel Security Training course equips business travellers with practical strategies to protect themselves and their organisation from being targeted when travelling overseas.

      Training is strongly application based and uses alternate reality environment scenarios such as airports, hotels, and business meetings to teach corporate travellers how to identify and respond to threats in real time. Over two days, participants will develop an understanding of:

      • Types of Travel Threats
      • OODA Loop
      • Situational Awareness
      • Counter-surveillance (digital/physical)
      • Research and Destination Preparation
      • Scenario Simulations

      The next dates for our Travel Security Training course are in June 2016. For more information, please contact [email protected]

      ro-service-tornado_02Red Team Training

      Traditional security testing does not always accurately reflect the true tactics, tradecraft or simple pure grit and determination of your adversary. Red Teaming is the process of viewing a problem from an adversary or competitor’s perspective. Red Teaming simulates realistic attack scenarios, using the same tradecraft and tools used by the adversary to mimic the threat to key business assets.

      This hands-on course will demonstrate how a genuine Red Team approach successfully combines physical, digital and social attack vectors in order to accurately replicate the activities of the adversary, to beat them at their own game. Using practical scenarios over two days, participants will learn:

      • The Red Team Mindset
      • Target Analysis
      • Adversary Analysis
      • Reconnaissance
      • Planning and Executing
      • Red Team Tactics

      The next dates for our Red Team Training course are in June 2016. For more information, please contact [email protected]