Cyber Exploitation (CET)
As a DoD Certified Red team (DCRT) leverage local, remote, and non-DoD capabilities to identify and exploit vulnerabilities in customer information networks to emulate contemporary cyber threats.

Wireless Exploitation (WES)
Leverage customer wireless footprints to inform cyber exploitation teams, and exploit and access customer information networks.

Close Access (CAS)
Analyze physical security human and technical controls to determine weaknesses that can be exploited to enable on-network operations for cyber and wireless exploitation.