Phone: (+44) 113 216 3188
  • Email: info@koyertraining.com
Koyer Training Services
  • Home
  • About Us
  • Our Programs
  • Our Venues
  • Contact Us

Threat-Led Security: Adversary Simulation and Red Teaming

Cybersecurity and Digital Risk October 25, 2025
Enquire About This Course

Introduction

Threat-Led Security (TLS) is a proactive, data-driven approach that moves beyond compliance-based testing to simulate the Tactics, Techniques, and Procedures (TTPs) of real-world adversaries targeting the organisation. This course provides an in-depth, hands-on methodology for conducting Red Team operations and Adversary Simulation. Participants will master how to emulate threat actor behavior, assess the effectiveness of defensive controls (Blue Team), and work collaboratively in "Purple Team" exercises to close critical security gaps. The goal is to rigorously test security defenses against the most relevant, current threats, ensuring the security program delivers maximum defensive value.

Objectives

The goal of this program is to provide security professionals with the advanced knowledge and practical skills to execute and manage threat-led security operations, including Red Teaming and Adversary Simulation:

Target Audience

  • Red Team Operators and Ethical Hackers.
  • Security Operations Center (SOC) Analysts (Tier 2/3).
  • Threat Hunters and Detection Engineers.
  • CISO and Security Directors.
  • Incident Response Team Members.
  • Vulnerability Management Specialists.
  • Security Architects.

Methodology

  • Hands-on labs using Red Team tools to simulate C2, persistence, and lateral movement.
  • Group activity developing a threat profile and TTPs for a mock Red Team engagement.
  • Mandatory Purple Team exercise collaborating to build a new SIEM detection rule.
  • Case studies on major threat-led simulation results and the changes they drove.
  • Technical discussions on the pros and cons of commercial vs. open-source simulation tools.

Personal Impact

  • Expert-level skills in planning and executing intelligence-driven Red Team operations.
  • Ability to rigorously test and prove the effectiveness of defensive controls.
  • Mastery of adversarial TTPs mapped to the MITRE ATT&CK Framework.
  • Enhanced collaboration and communication skills between offensive and defensive teams.
  • Credibility in presenting control gaps and risk in real-world attack context.
  • Skills to drive measurable, high-impact improvements to the security posture.

Organizational Impact

  • Rigorous validation of the security program against real-world, relevant threat actors.
  • Measurable improvement in the SOC's detection and response capabilities (MTTD/MTTR).
  • Optimized security spending by highlighting the most critical control gaps.
  • Stronger, more resilient defensive architecture based on attack feedback.
  • Demonstrable due diligence and preparedness to the Board and regulators.
  • Faster, more efficient remediation by pinpointing exact control failures.

Course Outline

Unit 1: Foundations of Threat-Led Security

Section 1.1: The TLS Methodology
  • Defining Threat-Led Security (TLS) and its distinction from Penetration Testing.
  • The role of Red Teaming, Blue Teaming, and Purple Teaming.
  • Leveraging the MITRE ATT&CK Framework as the common language for TTPs.
  • Establishing clear scope, legal authorization, and rules of engagement (ROE).
Section 1.2: Threat Intelligence for Simulation
  • Identifying and prioritizing relevant threat actors (e.g., APTs, Cybercrime).
  • Mapping threat actor TTPs to the organisation's assets and controls.
  • Developing specific, measurable Red Team objectives based on threat intelligence.
  • The importance of "intelligence-driven" over "exploit-driven" testing.

Unit 2: Red Team Operations Lifecycle

Section 2.1: Planning and Reconnaissance
  • The Red Team Kill Chain and planning phase.
  • Deep external and internal reconnaissance (OSINT, network mapping).
  • Developing and utilizing custom C2 (Command and Control) infrastructure.
  • Creating believable pretexts for social engineering and physical access.
Section 2.2: Initial Access and Exploitation
  • Techniques for gaining initial access (phishing, public-facing exploits).
  • Bypassing perimeter controls (e.g., EDR, AV, NGFW).
  • Exploiting identified vulnerabilities to gain a foothold.
  • Maintaining persistence without detection.

Unit 3: Internal Movement and Objectives

Section 3.1: Privilege Escalation and Lateral Movement
  • Post-exploitation techniques for privilege escalation (e.g., misconfigurations, kernel exploits).
  • Lateral movement techniques (Pass-the-Hash, RDP, WMI).
  • Credential dumping and harvesting strategies.
  • Avoiding detection by internal network security controls.
Section 3.2: Achieving Simulation Objectives
  • Identifying and exfiltrating "Crown Jewel" data assets.
  • Simulating disruption and denial-of-service against critical systems.
  • Testing the organisation's readiness to respond to a major incident.
  • Documenting all TTPs used and their success/failure against controls.

Unit 4: Purple Teaming and Defensive Improvement

Section 4.1: The Blue Team's Role (Detection)
  • Detecting and responding to Red Team activities (the role of the SOC/IR).
  • Analyzing logs and EDR alerts to reconstruct the Red Team's actions.
  • Developing and refining SIEM and EDR detection rules (Detection Engineering).
  • Measuring the Mean Time to Detect (MTTD) the Red Team.
Section 4.2: Collaborative Purple Teaming
  • Conducting collaborative sessions between Red and Blue Teams.
  • Real-time testing and refinement of defensive controls.
  • Developing comprehensive security control validation tests.
  • Using automation (e.g., Atomic Red Team, Caldera) for continuous simulation.

Unit 5: Reporting, Governance, and Maturity

Section 5.1: Reporting and Remediation
  • Structuring the Red Team report for executive and technical audiences.
  • Focusing the report on TTPs, control gaps, and business impact.
  • Developing a formal Plan of Action and Milestones (POAM) for identified gaps.
  • Integrating simulation findings into the overall security risk register.
Section 5.2: Program Maturity
  • Establishing a formal, continuous Threat-Led Security program.
  • Governance and oversight of external Red Team engagements.
  • Metrics for measuring the success and ROI of Adversary Simulation.
  • Developing internal Red Team capability and talent.

Ready to Learn More?

Have questions about this course? Get in touch with our training consultants.

Submit Your Enquiry

Upcoming Sessions

05 Jan

Dusseldorf

January 05, 2026 - January 09, 2026

Register Now
19 Jan

Geneva

January 19, 2026 - January 23, 2026

Register Now
09 Feb

Istanbul

February 09, 2026 - February 11, 2026

Register Now

Explore More Courses

Discover our complete training portfolio

View All Courses

Need Help?

Our training consultants are here to help you.

(+44) 113 216 3188 info@koyertraining.com
Contact Us
© 2025 Koyer Training Services - Privacy Policy
Search for a Course
Recent Searches
HR Training IT Leadership AML/CFT