back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Available NOW

ConDef 2026 with AI Teaching Asst
20% Launch Discount = Only $400
Expires Mid ET Jan 31


Add WinMalDev to Your Arsenal!

- WMD 1 = NameYourPrice Only $40
WMD Intro Path (1 - 3) = 46% Off
Expires Mid ET Jan 31


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blogs: Brief History of ConDef EcosystemConDef MCP – Meet Your AI Teaching Asst, Blue Team Training Roadmap
- Free Upskill Challenges: Home Lab, Nmap, PowerShell


Top Picks

- The Mishaal Bundle
- API Hacking by Katie Paxton-Fear
- MADS - Mastering AD Security Vols 1 - 3 by Slavi Parpulev


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...