back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Available NOW

ConDef 2026 w/ AI Teaching Asst
20% Launch Discount = Only $400
Expires Mid ET Jan 31


Add WinMalDev to Your Arsenal!

- WMD 1 = NameYourPrice Starting at $40
WMD Intro Path Courses 1-3 = 46% Off
Expires Mid ET Jan 31


Recent Releases

- WMD 5, SIEMless Threat Hunting
- 2 New Bundles 50% Off 7 CTFs, 75% Off 7 HALs
- Blog - ConDef MCP – Meet Your AI Teaching Assistant
- Free Upskill Challenge: PowerShell


Top Picks

- The Mishaal Bundle
- API Hacking by Katie Paxton-Fear
- Phishing – A Technical Course for Red Teaming by Cori Macy


Courses In Production

WMD 6, WebApp Pentest, Network Pentest, Deception, OS Hardening, Hardware Hacking 101, Dark Web 2...