GIAC Red Team Professional (GRTP) icon

GIAC Red Team Professional (GRTP)

Practitioner Certification

The GIAC Red Team Professional certification validates an individual’s ability to conduct end-to-end Red Team engagements. GRTP certification holders have demonstrated knowledge of building an adversary emulation plan, establishing an C2 infrastructure, and emulating adversary tactics, techniques, and procedures (TTPs) to assist in improving overall security.

Areas Covered

  • Building an adversary emulation plan using gathered threat intelligence
  • Creating a comprehensive attack infrastructure
  • Performing target reconnaissance
  • Gaining initial access
  • Network and Active Directory enumeration
  • Propagate throughout the network
  • Active Directory attacks
  • Bypassing common defense mechanisms
  • Collect and exfiltrate sensitive data
  • Producing an engagement report
  • Presenting Red Team actions to key personnel
  • Performing retesting and replaying of Red Team activities

Who is GRTP for?

  • Security professionals responsible for Red Team engagements
  • Penetration testers
  • Red Team members
  • Blue Team members
  • Auditors, defenders, and forensic specialists who are wanting to better understand offensive methodologies, tools, tactics, techniques, and procedures
  • Information security managers who participate in Red Ream engagements

Exam Format

  • 1 proctored exam
  • 75 questions
  • 2 hours
  • Minimum passing score of 76%

Delivery

NOTE: All GIAC Certification exams are web-based and required to be proctored. There are two proctoring options: remote proctoring through ProctorU, and onsite proctoring through PearsonVUE. Click here for more information.

GIAC certification attempts will be activated in your GIAC account after your application has been approved and according to the terms of your purchase. Details on delivery will be provided along with your registration confirmation upon payment. You will receive an email notification when your certification attempt has been activated in your account. You will have 120 days from the date of activation to complete your certification attempt.

Exam Certification Objectives & Outcome Statements

  • Adversary Emulation Fundamentals
    The candidate will have an understanding of common terminology, frameworks, and methodology associated with adversary emulation.
  • Attacking Active Directory
    The candidate will have an understanding of Active Directory objects, the different authentication methods offered within an Active Directory environment, and the techniques used to attack those authentication methods.
  • Command and Control infrastructure
    The candidate will have an understanding of command-and-control deployments, uses, channels and tools including Empire and Cobalt Strike.
  • Creating the Attack infrastructure
    The candidate will have an understanding how to create and manage an adversary infrastructure to include, an adversary domain, DNS, and an understanding of redirection and pivoting.
  • Discovery and Enumeration
    The candidate will have an understanding of how to perform network and Active Directory discovery and enumeration as well as how to acquire available credentials within the target environment.
  • Enumerating and Attacking Privileges
    The candidate will understand how to determine privileges within the environment and how to escalate to the required privileges to achieve their objectives including Linux attacks and performing privilege recon remotely.
  • Gaining Access
    The candidate will have an understanding on how to perform reconnaissance on a target, how to create and test a malicious payload, and how to deliver the malicious payload ensuring access to the target environment.
  • Leveraging the Domain
    The candidate will have an understanding of how to move within the target environment in order to achieve the objectives of the engagement.
  • Persistence and Exfiltration
    The candidate will have an understanding on different methods to gain persistence in a environment and how to exploit that persistence to complete the objectives of the engagement including, gaining access to a database, staging data for exfiltration, and emulating ransomware.
  • Red Team Engagement Planning and Reporting
    The candidate will be able to plan an engagement including tasks such as adversary profiling, scoping the engagement, and red team creation. The candidate will also be able to understand how to close the engagement including data consolidation, revealing the red teams actions, producing an engagement report, and determining if retesting will be completed.

Other Resources

  • Training is available in a variety of modalities including live training and OnDemand.
  • Practical work experience can help ensure that you have mastered the skills necessary for certification.
  • College level courses or self paced study through another program or materials may meet the needs for mastery.
  • Get information about the procedure to contest exam results.

Practice Tests

  • These tests are a simulation of the real exam allowing you to become familiar with the test engine and style of questions.
  • Practice exams are a gauge to determine if your preparation methods are sufficient.
  • The practice bank questions are limited so you may encounter the same question on practice tests when multiple practice tests are purchased.
  • Practice exams never include actual exam questions.
  • GIAC recommends leveraging additional study methods for test preparation.

Find Affiliate Training

Explore affiliate training options to prepare for your GIAC certification exam.