

Red Team Engineering
What separates a penetration tester from a true red team engineer? It comes down to building, not just using, the tools. In this episode of Simply Cyber Firesides, host Gerald Auger, Ph.D. sits down with Casey Erdmann to explore what it really means to operate at a higher level in offensive security. Casey brings over a decade of hands-on experience in red teaming and has contributed to the community through research, tool development, and speaking at conferences such as DEF CON’s Red Team Village. His work focuses on helping practitioners move beyond running scripts and toward engineering their own offensive capabilities. This conversation is centered around his upcoming book, which takes a practical, project-based approach to building real red team infrastructure and tools from the ground up.
🎯 Attend to learn:
What “red team engineering” is all about
The difference between using tools and building them
How to design and develop custom offensive tooling
Key components of modern red team infrastructure
Why understanding the “how” is critical for advancing in offensive security
Topics include building credential harvesting applications, developing custom tooling in languages like Go, creating command and control infrastructure, and managing environments at scale.
This session is ideal for penetration testers, red teamers, and security professionals looking to move beyond entry level offensive techniques and into building more advanced capabilities.
Register now to attend!