back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.



Available NOW!

ConDef 2026 with AI Teaching Assistant
20% Launch Discount = Only $400
Expires Mid ET Jan 31


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blog - Blue Team Training Roadmap
- Free Upskill Challenge: UC - PowerShell


Top Picks

- The Mishaal Bundle
- API Hacking by Katie Paxton-Fear
- Phishing – A Technical Course for Red Teaming by Cori Macy


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...