back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Announcements

🎅 Cyber Monday December 🎅

Code "CYBER25" = 25% Off ALL Courses until Mid ET Dec 31! Excludes Bundles & NameYourPrice items.

New Releases

- Windows Log Analysis - SIEMless Threat Hunting Learn threat hunting basics using only Win & open source tools. Just $45 w/ labs!
- 2 New Bundles - 50% OFF 7 CTF Bundle, 75% Off 7 Hack-Along Bundle
- Blog - Blue Team Training Roadmap

Top Picks

- ConDef 2025 Only $375 w/ Code CYBER25!
- The Mishaal Bundle
- Phishing – A Technical Course for Red Teaming

Courses In Production

WMD 5, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...

Additional content in this category: