Pillar A: CybersecurityA9

Penetration Testing & Red Teaming

Methodology (OSSTMM, PTES), web/network/mobile pentesting, social engineering, purple teaming.

Part of Pillar A: Cybersecurity · Cybersecurity groups the disciplines that share methods, tools, and threat models with Penetration Testing & Red Teaming.

What is Penetration Testing & Red Teaming?

Penetration testing and red teaming are the most honest assessments of whether security controls actually work under pressure. While defensive security builds walls, offensive security tests them — using the same techniques, tools, and mindset as real adversaries to find vulnerabilities before attackers do.

Penetration testing follows structured methodologies (OWASP, PTES, OSSTMM) to systematically identify vulnerabilities in networks, applications, and infrastructure. Red teaming goes further — simulating full adversary campaigns including social engineering, physical access, and multi-stage attack chains to test an organization's detection and response capabilities.

The field is being transformed by AI-assisted reconnaissance, automated exploitation tools, and the growing need for AI system red teaming. Purple teaming — the collaborative integration of offensive and defensive teams — is becoming the gold standard for continuous security improvement.

Why it matters

You don't know if your defenses work until someone tests them. Pentesting and red teaming provide ground truth about security posture that no compliance audit or vulnerability scan can deliver.

Offensive security validates every other security domain. It tests whether the controls built by security engineers, the policies written by GRC, and the detections built by SOC analysts actually hold up against real attack techniques.

Key topics

Penetration testing methodology (OWASP, PTES, OSSTMM)
Web application testing (OWASP Top 10)
Network penetration testing
Social engineering (phishing, vishing, pretexting)
Red team operations and campaign planning
Purple teaming and collaborative improvement
Cloud penetration testing (AWS, Azure, GCP)
Mobile application testing
Physical security testing
AI system red teaming
Report writing and risk communication

People shaping this field

Researchers and practitioners worth following in this space.

Social engineering expert and red teamer

Penetration tester and author of Penetration Testing

Joe Grand

Hardware hacker and physical security tester

Curated resources

Authoritative sources we ground Penetration Testing & Red Teaming questions in — frameworks, research, guides, and tools.

Roles where this matters

Career paths where this domain shows up as core or recommended.

🔍Penetration TesterCore

Ethically hack systems to find vulnerabilities before attackers do. Offensive security requires deep technical knowledge.

💻AppSec / DevSecOps EngineerRecommended

Embed security into the software development lifecycle. Shift left to catch vulnerabilities before they reach production.

🐛Vulnerability Management LeadRecommended

Owns the end-to-end find → prioritize → fix → verify loop at scale, now increasingly AI-driven.

Certifications that signal this domain

Credentials whose blueprint meaningfully covers this domain. Core means centrally covered; also touched means present in the blueprint but not the primary focus.

Core coverage

BSCPProfessional·UnbekanntOfficial page →

Portswigger Burp Suite Certified Practioner

Portswigger Burp Suite Certified Practioner

C)PEHProfessional·Mile2Official page →

Mile2 Certified Professional Ethical Hacker

Mile2 Certified Professional Ethical Hacker

C)PSHProfessional·Mile2Official page →

Mile2 Certified Powershell Hacker

Mile2 Certified Powershell Hacker

C)PTCProfessional·Mile2Official page →

Mile2 Certified Penetration Testing Consultant

Mile2 Certified Penetration Testing Consultant

C)PTEProfessional·Mile2Official page →

Mile2 Certified Penetration Testing Engineer

Mile2 Certified Penetration Testing Engineer

C)VAProfessional·Mile2Official page →

Mile2 Certified Vulnerability Assessor

Mile2 Certified Vulnerability Assessor

CCPenX-AWSExpert·AWSOfficial page →

The SecurityOps Group Certified Cloud Pentesting eXpert-AWS

The SecurityOps Group Certified Cloud Pentesting eXpert-AWS

CEHAssociate·EC-CouncilOfficial page →

Certified Ethical Hacker

Offensive-concepts breadth; light on hands-on rigor compared to OSCP.

CHAProfessional·SECOOfficial page →

ISECOM Certified Hacker Analyst

ISECOM Certified Hacker Analyst

CHATProfessional·SECOOfficial page →

ISECOM Certified Hacker Analyst Trainer

ISECOM Certified Hacker Analyst Trainer

CM)IPSExpert·Mile2Official page →

Mile2 Certified Master Intrusion Prevention Specialist

Mile2 Certified Master Intrusion Prevention Specialist

CPENTProfessional·EC-CouncilOfficial page →

EC Council Certified Penetration Testing Professional

EC Council Certified Penetration Testing Professional

CREST CCSASProfessional·CRESTOfficial page →

CREST Certified Simulated Attack Specialist

CREST Certified Simulated Attack Specialist

CREST CCTAPPProfessional·CRESTOfficial page →

CREST Certified Web Application Tester

CREST Certified Web Application Tester

CREST CCTIMProfessional·CRESTOfficial page →

CREST Certified Threat Intelligence Manager

CREST Certified Threat Intelligence Manager

CREST CCTINFProfessional·CRESTOfficial page →

CREST Certified Infrastructure Tester

CREST Certified Infrastructure Tester

CREST CPSAProfessional·CRESTOfficial page →

CREST Practitioner Security Analyst

CREST Practitioner Security Analyst

CREST CRTProfessional·CRESTOfficial page →

CREST Registered Penetration Tester

The CREST Registered Penetration Tester is a practical, UK-oriented certification that has established itself as an important industry standard for penetration testers, particularly in the UK market and for organizations with CHECK requirements. Unlike purely theory-based certifications, the CRT exam includes a technical, partially practical component in a controlled test environment. The combination of multiple-choice, flags, and short answers distinguishes CRT from pure CTF formats like OSCP. Outside the UK and Australia, market penetration is limited; internationally, OSCP is significantly better known. However, for testers seeking to work in the UK public sector or at CREST-accredited firms, CRT is effectively mandatory.

CRTEExpert·Altered SecurityOfficial page →

Certified Red Team Expert

Multi-forest AD compromise — cross-trust abuse, advanced delegation, and persistence in hardened enterprise environments.

CRTOProfessional·Zero-Point SecurityOfficial page →

Zero Point Security Certified Red Team Operator

The CRTO from Zero-Point Security has established itself as one of the most practice-oriented red team certifications on the market. The associated course 'Red Team Ops' focuses on Cobalt Strike, Active Directory attacks, and realistic adversary simulation with OPSEC considerations. The exam format is purely practical and evaluates not only objective achievement but also operational behavior – points are deducted for triggered detections. Particularly attractive is the price-performance ratio compared to SANS certifications, as the course and exam are significantly more affordable. For experienced pentesters looking to develop towards red teaming and C2 deployment, the CRTO is a highly relevant qualification.

CRTO IIProfessional·Zero-Point SecurityOfficial page →

Zero Point Security Red Team Operator II

Zero Point Security Red Team Operator II

CRTPProfessional·Altered SecurityOfficial page →

Certified Red Team Professional

Hands-on Active Directory attacker — Kerberos abuse, trust attacks, and lateral movement against a real multi-domain forest.

CSRProfessional·Compliance & Risk GroupOfficial page →

Cyber Struggle Ranger

Cyber Struggle Ranger

CSTLLeadership·TigerschemeOfficial page →

Cyber Scheme Team Leader

Cyber Scheme Team Leader

CSTMProfessional·TigerschemeOfficial page →

Cyber Scheme Team Member

Cyber Scheme Team Member

DV MoSProfessional·Dark VortexOfficial page →

Dark Vortex Malware on Steroids

Dark Vortex Malware on Steroids

DV OTDProfessional·Dark VortexOfficial page →

Dark Vortex Offensive Tool Development

Dark Vortex Offensive Tool Development

DV RTOSProfessional·Dark VortexOfficial page →

Dark Vortex Red Team & Operational Security

Dark Vortex Red Team & Operational Security

eCPPTProfessional·INE/eLearnSecurityOfficial page →

eLearnSecurity Certified Professional Penetration Tester

eLearnSecurity Certified Professional Penetration Tester

EEHFAssociate·EXINOfficial page →

EXIN Ethical Hacking Foundation

EXIN Ethical Hacking Foundation

eJPTEntry·INEOfficial page →

eLearnSecurity Junior Penetration Tester

Entry-level pentest — good first offensive signal.

eMAPTProfessional·INE/eLearnSecurityOfficial page →

eLearnSecurity Mobile Application Penetration Tester

eLearnSecurity Mobile Application Penetration Tester

eWPTProfessional·INE/eLearnSecurityOfficial page →

eLearnSecurity Web Application Penetration Tester

eLearnSecurity Web Application Penetration Tester

eWPTXProfessional·INE/eLearnSecurityOfficial page →

eLearnSecurity Web Application Penetration Tester eXtreme

eLearnSecurity Web Application Penetration Tester eXtreme

GAWNProfessional·GIACOfficial page →

GIAC Assessing Wireless Networks

GIAC Assessing Wireless Networks

GCPNProfessional·GIACOfficial page →

GIAC Cloud Penetration Tester

GIAC Cloud Penetration Tester

GPENProfessional·GIAC / SANSOfficial page →

GIAC Penetration Tester

Penetration testing methodology + documentation.

GRTPProfessional·GIACOfficial page →

GIAC Red Team Professional

GIAC Red Team Professional

GWAPTProfessional·GIACOfficial page →

GIAC Web Application Penetration Tester

GIAC Web Application Penetration Tester

GX-PTProfessional·GIACOfficial page →

GIAC Experienced Penetration Tester

GIAC Experienced Penetration Tester

GXPNExpert·GIACOfficial page →

GIAC Exploit Researcher and Advanced Penetration Tester

GIAC Exploit Researcher and Advanced Penetration Tester

HTB CBBHProfessional·Hack The BoxOfficial page →

Hack the Box Certified Bug Bounty Hunter

Hack the Box Certified Bug Bounty Hunter

HTB CPTSProfessional·Hack The BoxOfficial page →

Hack the Box Certified Penetration Testing Specialist

Hack the Box Certified Penetration Testing Specialist

HTB CWEEExpert·Hack The BoxOfficial page →

Hack the Box Certified Web Exploitation Expert

Hack the Box Certified Web Exploitation Expert

KLCPProfessional·Linux FoundationOfficial page →

Kali Linux Certified Professional

Kali Linux Certified Professional

LPTProfessional·EC-CouncilOfficial page →

EC Council Licensed Penetration Tester

EC Council Licensed Penetration Tester

MAD Adv. EmulationProfessional·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — Adversary Emulation Methodology

The most hands-on intensive MAD20 track: Adversary Emulation based on ATT&CK. 30 lectures, 7 hands-on labs, 60+ range scenarios via the ARENAS platform. Covers planning, development and execution of adversary emulation plans. Badge upon completion (21 CPE hours).

MAD Purple TeamingProfessional·MITRE EngenuityOfficial page →

MITRE ATT&CK Defender — Purple Teaming

MAD20 track for Purple Teaming with ATT&CK methodology. 32 lectures, planning and execution walkthroughs. Covers coordination between red and blue teams using the ATT&CK framework. Badge upon completion (13 CPE hours).

OPSTProfessional·SECOOfficial page →

ISECOM OSSTMM Professional Security Tester

ISECOM OSSTMM Professional Security Tester

OSCE3Expert·OffSecOfficial page →

Offensive Security Certified Expert 3

Offensive Security Certified Expert 3

OSCPProfessional·OffSecOfficial page →

Offensive Security Certified Professional

Hands-on penetration testing — exploitation, privilege escalation, AD attacks.

OSEDProfessional·OffSecOfficial page →

Offensive Security Exploit Developer

Offensive Security Exploit Developer

OSEEExpert·OffSecOfficial page →

Offensive Security Exploitation Expert

Offensive Security Exploitation Expert

OSEPProfessional·OffSecOfficial page →

Offensive Security Experienced Penetration Tester

The OffSec Experienced Penetration Tester (OSEP) is based on the PEN-300 course and addresses advanced techniques around antivirus evasion, Active Directory attacks, and living-off-the-land methods. The fully practical 48-hour exam (47:45 hrs exam + 24 hrs report) in a simulated enterprise environment is the key difference from knowledge-based certifications—it tests real attack capabilities. OSEP is considered credible proof of high-level offensive competence in red team circles, but requires solid OSCP knowledge. Together with OSED and OSWE, OSEP forms the OSCE³ trio.

OSMRProfessional·OffSecOfficial page →

Offensive Security MacOS Researcher

Offensive Security MacOS Researcher

OSWAProfessional·OffSecOfficial page →

Offensive Security Web Assessor

Offensive Security Web Assessor

OSWEExpert·OffSecOfficial page →

Offensive Security Web Expert

Advanced web application exploitation — whitebox review, vulnerability chain construction.

OSWPProfessional·OffSecOfficial page →

Offensive Security Wireless Professional

Offensive Security Wireless Professional

PACESProfessional·ITGSIOfficial page →

Pentester Academy Certified Enterprise Security Specialist

Pentester Academy Certified Enterprise Security Specialist

PJMRAssociate·PMIOfficial page →

Practical Junior Malware Researcher

Practical Junior Malware Researcher

PNPTProfessional·TCM SecurityOfficial page →

Practical Network Penetration Tester

Hands-on network + AD pentesting with OSINT + reporting.

S-CEHLLeadership·SECOOfficial page →

SECO Certified Ethical Hacker Leader

SECO Certified Ethical Hacker Leader

S-EHEExpert·SECOOfficial page →

SECO Ethical Hacker Expert

SECO Ethical Hacker Expert

S-EHFAssociate·SECOOfficial page →

SECO Ethical Hacking Foundation

SECO Ethical Hacking Foundation

S-EHPProfessional·SECOOfficial page →

SECO Ethical Hacking Practitioner

SECO Ethical Hacking Practitioner

SOG CAPenProfessional·Mile2Official page →

The SecOps Group Certified AppSec Pentester

The SecOps Group Certified AppSec Pentester

SOG CAPenXExpert·Mile2Official page →

The SecurityOps Group Certified AppSec Pentesting eXpert

The SecurityOps Group Certified AppSec Pentesting eXpert

SOG CMPen AndProfessional·Mile2Official page →

The SecOps Group Certified Mobile Pentester - Android

The SecOps Group Certified Mobile Pentester - Android

SOG CMPen iOSProfessional·Mile2Official page →

The SecOps Group Certified Mobile Pentester - iOS

The SecOps Group Certified Mobile Pentester - iOS

SOG CNPenProfessional·Mile2Official page →

The SecOps Group Certified Network Pentester

The SecOps Group Certified Network Pentester

Also touched

CISSPExpert·ISC2Official page →

Certified Information Systems Security Professional

Breadth across security engineering, architecture, operations, and governance at senior-IC / manager level. The default senior-generalist signal.

Browse all certifications → — pick a cert on the interactive map to highlight every domain it covers.

More in Cybersecurity

Test what you know about Penetration Testing & Red Teaming

42 questions available. Beginner to expert questions, scored against the global leaderboard.