www.giac.org Open in urlscan Pro
45.60.31.34  Public Scan

Submitted URL: https://click.email.sans.org/?qs=9886910364c3ebb094e6415feb2b90898f892437b350e95151bac6fd4164cd6fba4bee4dd706bc7d1c5f0e1316b2...
Effective URL: https://www.giac.org/certifications/red-team-professional-grtp/?utm_medium=Email&utm_source=HL-GL&utm_content=1353070...
Submission: On May 20 via api from TR — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

homepage
Open menu

Go one level top

 * Get Certified
   * Why Certify?
   * Get Started
   * How to Prepare
   * CyberLive
   * GIAC Portfolio Certifications
 * Focus Areas
   * Cyber Defense
   * Offensive Operations
   * Digital Forensics & Incident Response
   * Cloud Security
   * Industrial Control Systems
   * Management & Leadership
   * All Certifications
 * Renewal
   * Why Renew?
   * How to Renew
   * CPE Information
   * Earn CPEs at Events
 * Workforce Development
   * Enterprise
   * DoDD 8140
   * NICE Framework
 * Resources
   * Blog
   * Podcasts
   * Certification Holder Directory
   * Research Papers
   * Digital Catalog
 * About
   * ANAB Accreditation
   * Community
   * Company Info
   * Press Room
   * Policies & Guidelines
   * Frequently Asked Questions
   * Contact
   

 * Affiliate Sites
   * SANS Institute
   * Internet Storm Center
   * SANS Technology Institute
 * Search
 * Log In
 * * Account Dashboard
   * Logout

 1. Home >
 2. Certifications >
 3. GIAC Red Team Professional (GRTP)


GIAC RED TEAM PROFESSIONAL (GRTP)

Practitioner Certification
Register Now Renew

The GIAC Red Team Professional certification validates an individual’s ability
to conduct end-to-end Red Team engagements. GRTP certification holders have
demonstrated knowledge of building an adversary emulation plan, establishing an
C2 infrastructure, and emulating adversary tactics, techniques, and procedures
(TTPs) to assist in improving overall security.


OverviewExam FormatObjectivesOther ResourcesAffiliate Training


AREAS COVERED

 * Building an adversary emulation plan using gathered threat intelligence
 * Creating a comprehensive attack infrastructure
 * Performing target reconnaissance
 * Gaining initial access
 * Network and Active Directory enumeration
 * Propagate throughout the network
 * Active Directory attacks
 * Bypassing common defense mechanisms
 * Collect and exfiltrate sensitive data
 * Producing an engagement report
 * Presenting Red Team actions to key personnel
 * Performing retesting and replaying of Red Team activities


WHO IS GRTP FOR?

 * Security professionals responsible for Red Team engagements
 * Penetration testers
 * Red Team members
 * Blue Team members
 * Auditors, defenders, and forensic specialists who are wanting to better
   understand offensive methodologies, tools, tactics, techniques, and
   procedures
 * Information security managers who participate in Red Ream engagements


EXAM FORMAT

 * 1 proctored exam
 * 75 questions
 * 2 hours
 * Minimum passing score of 76%


DELIVERY

NOTE: All GIAC Certification exams are web-based and required to be proctored.
There are two proctoring options: remote proctoring through ProctorU, and onsite
proctoring through PearsonVUE. Click here for more information.


GIAC certification attempts will be activated in your GIAC account after your
application has been approved and according to the terms of your purchase.
Details on delivery will be provided along with your registration confirmation
upon payment. You will receive an email notification when your certification
attempt has been activated in your account. You will have 120 days from the date
of activation to complete your certification attempt.


EXAM CERTIFICATION OBJECTIVES & OUTCOME STATEMENTS

 * Adversary Emulation Fundamentals
   The candidate will have an understanding of common terminology, frameworks,
   and methodology associated with adversary emulation.
 * Attacking Active Directory
   The candidate will have an understanding of Active Directory objects, the
   different authentication methods offered within an Active Directory
   environment, and the techniques used to attack those authentication methods.
 * Command and Control infrastructure
   The candidate will have an understanding of command-and-control deployments,
   uses, channels and tools including Empire and Cobalt Strike.
 * Creating the Attack infrastructure
   The candidate will have an understanding how to create and manage an
   adversary infrastructure to include, an adversary domain, DNS, and an
   understanding of redirection and pivoting.
 * Discovery and Enumeration
   The candidate will have an understanding of how to perform network and Active
   Directory discovery and enumeration as well as how to acquire available
   credentials within the target environment.
 * Enumerating and Attacking Privileges
   The candidate will understand how to determine privileges within the
   environment and how to escalate to the required privileges to achieve their
   objectives including Linux attacks and performing privilege recon remotely.
 * Gaining Access
   The candidate will have an understanding on how to perform reconnaissance on
   a target, how to create and test a malicious payload, and how to deliver the
   malicious payload ensuring access to the target environment.
 * Leveraging the Domain
   The candidate will have an understanding of how to move within the target
   environment in order to achieve the objectives of the engagement.
 * Persistence and Exfiltration
   The candidate will have an understanding on different methods to gain
   persistence in a environment and how to exploit that persistence to complete
   the objectives of the engagement including, gaining access to a database,
   staging data for exfiltration, and emulating ransomware.
 * Red Team Engagement Planning and Reporting
   The candidate will be able to plan an engagement including tasks such as
   adversary profiling, scoping the engagement, and red team creation. The
   candidate will also be able to understand how to close the engagement
   including data consolidation, revealing the red teams actions, producing an
   engagement report, and determining if retesting will be completed.


OTHER RESOURCES

 * Training is available in a variety of modalities including live training and
   OnDemand.
 * Practical work experience can help ensure that you have mastered the skills
   necessary for certification.
 * College level courses or self paced study through another program or
   materials may meet the needs for mastery.
 * Get information about the procedure to contest exam results.


PRACTICE TESTS

 * These tests are a simulation of the real exam allowing you to become familiar
   with the test engine and style of questions.
 * Practice exams are a gauge to determine if your preparation methods are
   sufficient.
 * The practice bank questions are limited so you may encounter the same
   question on practice tests when multiple practice tests are purchased.
 * Practice exams never include actual exam questions.
 * Purchase a GRTP practice test here.
 * GIAC recommends leveraging additional study methods for test preparation.

Find Affiliate Training
Prepare for your GIAC exam with affiliate training.
Learn More

"With this course we provide students with a blueprint they can use to set up a
realistic Red Team operation against a client environment. Students will be able
to consume threat intelligence, formulate a plan of attack, execute it, and
ultimately create a debrief package that will provide maximum value for their
organization. This course truly brings together a wide variety of knowledge
provided by actual real world practitioners and aims to equip the students with
state-of-the-art tradecraft, keeping up to date with the latest and greatest
TTPs. No other course brings together such a wide variety of knowledge of all
things Red Team." – Jean-Francois Maes, Certified SANS Instructor



FIND AFFILIATE TRAINING

Explore affiliate training options to prepare for your GIAC certification exam.
Find Training Now
 * © 2024 GIAC®
   
 * Privacy Policy
 * Terms and Conditions
 * Do Not Share/Sell My Personal Information
 * Contact

 * Twitter
 * Facebook
 * LinkedIn


 X




$H2

$hl

X



COOKIE PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

ANALYTICS COOKIES

Analytics Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button Back



Vendor Search Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices

Cookies Button

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. View Cookie Policy

Accept All Cookies
Cookies Settings