back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Announcements

Black Friday Comes Early!

Use code "BlackFriday25" at checkout for 25% off all courses including ConDef! Excludes already discounted Bundles. Expires Nov 30 at Midnight ET.

Nov Course Release

Windows Log Analysis - SIEMless Threat Hunting Learn threat hunting basics using only simple Windows Log Analysis & open source tools. Only $60 w/ labs!

Top Picks

Courses Coming Soon

WMD 5 - The Beacon Strikes Back, WebApp Pentesting - Jr Analyst, Network Pentesting - Jr Analyst, Dark Web 2... Stay tuned!

Additional content in this category: