Cresco Cybersecurity
Speciality: Penetration Testing and Red Teaming
Cybersecurity company specializing in penetration testing, ethical hacking, and security assessments; 13 employees with 26.7% YoY growth; founded 2020; based in Brussels, Belgium; offers red team, blue team, phishing, awareness training, and security transformation services.
CRTP Certification Overview
Origin and Background
The Certified Red Team Professional (CRTP) certification was created by Pentester Academy (now part of INE Security), founded by Nikhil Mittal. Launched in the mid-2010s, the CRTP was developed to address the growing need for practical, hands-on training in Active Directory security and Windows domain exploitation. Unlike many theoretical cybersecurity certifications, CRTP was designed to provide security professionals with real-world attack simulation skills, focusing specifically on the techniques used by adversaries to compromise enterprise networks.
Industry Value and Importance
The CRTP is valued in the cybersecurity industry for its practical, lab-based approach to red team operations and Active Directory attacks. Employers recognize it as evidence that a professional can perform actual penetration testing techniques rather than simply understanding theoretical concepts. The certification is particularly respected for its focus on Windows enterprise environments, which remain the backbone of most corporate networks. For offensive security professionals, red teamers, and penetration testers, the CRTP demonstrates hands-on capability in privilege escalation, lateral movement, and domain compromise—skills that are directly applicable to real-world security assessments and are increasingly sought after as organizations prioritize proactive security testing.
CISM Certification: Origin
The Certified Information Security Manager (CISM) certification was created by ISACA (Information Systems Audit and Control Association) in 2003. ISACA developed CISM to address the growing need for a certification specifically focused on information security management and governance, rather than just technical security skills. The certification was designed to recognize professionals who design, manage, and oversee an enterprise's information security program, filling a gap between technical security certifications and the strategic, managerial aspects of cybersecurity.
Industry Value and Importance
CISM is highly valued in the cybersecurity industry because it demonstrates expertise in security risk management, governance, incident management, and program development from a management perspective. Many organizations, particularly large enterprises and government agencies, specifically seek CISM-certified professionals for leadership roles in information security. The certification is globally recognized and often commands higher salaries compared to non-certified peers. Its focus on aligning security practices with business objectives makes it particularly relevant for professionals aspiring to senior security management positions, including Chief Information Security Officer (CISO) roles.
ISO 27001 Lead Auditor Certification
Origin
The ISO 27001 Lead Auditor certification stems from the ISO/IEC 27001 standard, which was published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC) in 2005, with its roots in the British Standard BS 7799. The certification was created to train professionals to audit information security management systems (ISMS) against the ISO 27001 standard. Various accredited training organizations worldwide offer this certification, following guidelines established by bodies like IRCA (International Register of Certificated Auditors) and other national accreditation organizations.
Industry Value
The ISO 27001 Lead Auditor certification is highly valued because it demonstrates an individual's expertise in conducting comprehensive information security audits and assessing organizational compliance with internationally recognized security standards. Organizations worldwide seek certified lead auditors to perform internal audits, prepare for external certification audits, and ensure their ISMS meets regulatory and customer requirements. The certification is particularly important for consulting firms, audit organizations, and enterprises managing sensitive data, as it provides assurance that security controls are properly implemented and maintained according to global best practices.
The GPEN Certification: Origin
The GPEN (GIAC Penetration Tester) certification was created by the Global Information Assurance Certification (GIAC), an organization founded in 1999 as part of the SANS (SysAdmin, Audit, Network, and Security) Institute. GIAC developed the GPEN to validate the technical skills of cybersecurity professionals who perform penetration testing and ethical hacking. The certification was designed to ensure that practitioners possess both the theoretical knowledge and hands-on abilities needed to conduct proper security assessments and identify vulnerabilities in networks and systems.
Industry Value and Importance
The GPEN certification is highly valued in the cybersecurity industry because it demonstrates practical, real-world penetration testing skills rather than just theoretical knowledge. Employers recognize GPEN-certified professionals as capable of conducting thorough security assessments, understanding attack vectors, and properly documenting findings. The certification meets DoD 8570/8140 requirements for certain Information Assurance positions, making it particularly valuable for government contractors and federal positions. Its focus on hands-on methodology and current attack techniques makes GPEN holders sought after for offensive security roles, penetration testing teams, and security consulting positions.
- GameStop
- Basin Holdings
- Life Sciences Industry (Orthofix)
- FleetPride
- Prayas (Energy Group)
- First Bank Texas
- Dallas Area Rapid Transit
- Tactical Institute