This book explores the new attack strategy that the organizations now need to embrace to combat the modern cyber threat. The book details from start to finish how to set up a Red Team practice within an organization. It defines the overall approach, the strategy required, the tools of the craft, etc. that would allow Information Security professionals within an organization to understand how they can set up a Red Team practice. The book also details the required infrastructure setup, defines examples of how to create engagments based on Threat Actor profiles and uses real world case studies as ways of justifying those examples. The book has been created with one goal in mind .i.e. to help security professionals use their current skill-sets and build on top of it to be a part of the new paradigm that will change the way organizations do their defense.