back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Dark Web 2 is Here!

Bring your hoodie & hacker mindset to DW2 - CTI Researcher (20% Off)
Get 25% Off DW 1 & 2 (Bundle)


WMD 6 Not Quite Ready

Our delay is your benefit. Deals still live!
WMD 1 = $40, WMD Intro Path (1-3) = 46% Off


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blogs: Brief History of ConDef EcosystemConDef MCP – Meet Your AI Teaching Asst, Blue Team Training Roadmap
- Free UCs: Home Lab, Nmap, PowerShell


Top Picks

The Mishaal Bundle, ConDef 2026, API Hacking, Phishing


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101...