Altered Security
ONLINE LABS
BOOTCAMPS
CERTIFICATIONS
TRAININGS
BLOG
RESOURCES
TESTIMONIALS
ABOUT US
NEWS
CONTACT
More
CRTP Certification
A certificate holder has demonstrated the understanding of AD security. They can identify and enumerate interesting information and execute variety of attack techniques like local and domain privilege escalation, persistence, trust abuse and antivirus evasion with minimal chances of detection.
CRTM Certification
A CRTM holder is a master in enterprise AD security. They have the ability to identify, exploit, demonstrate and fix security issues in an enterprise. They have demonstrated the ability to understand and secure the modern enterprise network by executing a silent red team operation starting from a beachhead leading to compromise of multiple forests.
CARTP Certification
A Certified Azure Red Team Professional (CARTP) holder has demonstrated the skills to understand and assess security of an Azure environment. A certificate holder would have practical knowledge of assessing security of Azure infrastructure of an enterprise spread across multiple tenants and hybrid identity.
CAWASP Certification
A certification holder demonstrates hands-on knowledge of app security in Azure. They have knowledge of executing security assessments of various web application technologies in Azure (like Enterprise Apps, App Services, Functions, OAuth Permissions, Databases etc.) and understanding of security controls (WAF, MDCA, MDC, etc.)
CRTE Certification
A certificate holder has demonstrated an expert level understanding of red team and enterprise security. They can customize open source tools and can abuse other built-in tools to perform enumeration, local privileges escalation, impersonation, pivoting, allowlisting bypasses as well as identify sensitive data in a highly secure environment.
Linux AD Certification
A certification holder demonstrates the understanding of active directory based attacks and holds the skills to test the most prevalent mis-configurations in enterprise active directory environments. They can use popular open source tools to run security assessments and penetration tests of an enterprise environment.