Rooms
![](https://humblecipher.com/wp-content/uploads/2023/04/Razofly_red_team_icon_for_cybersecurity_85ddd6aa-6ce3-4489-88ae-7f470abc3c1d.png)
Red Teaming
Use diverse techniques for initial access
Enumerate and persist on targets
Evade security solutions
Exploit Active Directory
![](https://humblecipher.com/wp-content/uploads/2023/04/b8f0c662-660b-425f-aaac-f0c97c7fe5d9-e1682264914854.jpeg)
Blue Teaming
Detect threats
Gather threat actor intelligence
Understand and emulate adversary TTPs
Identify and respond to incidents
![](https://humblecipher.com/wp-content/uploads/2023/04/a1f4981a-6ca1-4a01-a903-8668dfc7573a-e1682264561415.jpeg)
Security Analyst
Monitor and investigate alerts
Configure and manage security tools
Develop and implement IDS signatures
Escalate the security incidents to the higher team if needed