This training program introduces participants to the core concepts of malware development from an offensive red team perspective. Rather than focusing on heavy coding, the course emphasizes understanding how implants work, why certain techniques are used, and how red teams think about building custom tools.
Through clear explanations, real-world examples, and structured lectures, participants will build a solid conceptual foundation in implant design, tradecraft basics, and operational considerations, all without needing advanced programming skills.
What to expect: All course material, including commands, slides, and source code snippets for malware. Additionally, technical support will be extended during and after the training class.
This training is designed for the following security professionals:
Beginner to Intermediate. You should have:
Please prepare the following before the training:
Aravind Prakash is a Senior Security Consultant at Optiv, specializing in offensive security and tradecraft development. With extensive experience in red teaming and offensive operations, he has led numerous complex engagements across industries, helping organizations strengthen their resilience against real-world adversaries.
He holds CRTP, CRTE, CRTO, and CRTO 2 certifications and has a strong background in adversary simulation, detection evasion, and red team tradecraft. Aravind has also worked as a trainer, delivering hands-on workshops for clients from different sectors with varied requirements.
He has delivered talks and training sessions at c0c0n, sharing insights on offensive security, red team methodologies, and detection bypass techniques.