back to top

UC – Penetration Testing Methodology

A penetration testing methodology can be thought of as a recipe or blueprint, providing the steps required to conduct a penetration test. Methodologies are helpful and, in some cases, required to provide a repeatable process for quality results. Phillip Wylie introduces multiple pentesting methodologies with a focus on what organizations expect during and after an engagement.

Price = FREE!

What’s an Upskill Challenge (UC)?

A UC is a CTF-style, bite-sized lesson from the JHT Team, our courseware developers as well as “friends” of JHT. They are meant to be short and to the point. UCs focus on a single tool or concept and are helpful in quickly providing useful skills that might be prerequisites for other types of educational content on the platform.

A UC should be 10 – 30 minutes of student time and have no VMs. There are quizzes to make sure that the content is understood.

Prerequisites for UC – Penetration Testing Methodology

UCs assume no knowledge at all! They’re meant to be completely self-contained, so all of the answers are in the lesson. No outside research is required.


Announcements

Black Friday Comes Early!

Use code "BlackFriday25" at checkout for 25% off all courses including ConDef! Excludes already discounted Bundles. Expires Nov 30 at Midnight ET.

Nov Course Release

Ransomware Analysis Basics! NameYourPrice course explores ransomware in a protected lab. Hack the attackers' process & learn tools of a Digital Forensic Investigator. Starting at only $25!

Top Picks

Courses Coming Soon

WMD 5 - The Beacon Strikes Back, Elastic Case Studies Vol 1, WebApp Pentesting - Jr Analyst, Network Pentesting - Jr Analyst, Dark Web 2... Stay tuned!

Additional content in this category: