Career Path

Penetration Tester

Career Path

Penetration Testers are professional ethical hackers, responsible for assessing the security posture of applications and networks on behalf of their employers. This career path will prepare you for success as an entry-level Pentester.

Path Releasing Q2 2025
Full access included with 
Insider Pro
 and 
Teams

43

H

0

M
Time

Intermediate

i
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

22

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this Career Path

Cybrary’s Penetration Tester career path and associated assessments will equip you with the knowledge and hands-on skills you need to launch your career as a Penetration Tester. Over the course of 20+ courses and hands-on virtual labs, you will learn how to successfully identify, exploit, and remediate security vulnerabilities, and build a strong foundation of ethical hacking knowledge and skills. 

As you proceed through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. 

Read More

Skills you'll gain

  • Conducting offensive security assessments
  • Performing reconnaissance and network enumeration
  • Executing and defending against network attacks
  • Using evasion techniques to bypass security measures
  • Defending against credential attacks
  • Identifying vulnerabilities in applications

Path Outline

Collection Outline

Coming Soon

The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.

Start Learning for Free
1

Learn

Learn core concepts and get hands-on with key skills.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Offensive Security Operations
1
H
5
M

In this course, you will be introduced to fundamental offensive security concepts, legal and ethical issues, documents and agreements, and operational frameworks and methodologies.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Cyber Kill Chains
1
H
15
M

In this course, you will delve into the concept of the "kill chain" and explore some well-known cyber kill chains, including the Cyber Kill Chain (CKC), the MITRE ATT&CK framework, and the Unified Kill Chain (UKC).

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Reconnaissance and Enumeration Basics
1
H
0
M

In this course, you will be introduced to reconnaissance and enumeration in the context of an offensive security engagement. You will learn the distinction between the terms, how they are related, and the basic techniques that support them in a offensive security context.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
OSINT
1
H
15
M

In this hands-on lab, you will learn the basics of Open-Source Intelligence (OSINT). You will practice gathering publicly available information about a target organization's assets and people from a number of sources.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Network Reconnaissance
1
H
20
M

In this lab, you will learn the basics of performing reconnaissance and enumeration on a target network. You will practice using Masscan and Nmap to scan and enumerate a network.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Network Attacks Basics
1
H
0
M

In this course, you will learn the basics of network-based attacks. You will learn about active and passive network attacks, as well as network devices, services, and protocols, and the common attack types and techniques directed at them.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Network Sniffing
1
H
20
M

In this hands-on lab, you will learn the basics of network sniffing, including passive and active sniffing techniques. You will practice using Wireshark to sniff network traffic, and retrieve and apply actionable information from a target network.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Metasploit Basics
1
H
15
M

In this hands-on lab, you will learn the basics of Metasploit, a popular penetration testing tool. You will practice using some core features of Metasploit to identify and exploit vulnerabilities on a live server.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Password Cracking
1
H
10
M

In this hands-on lab, you will learn the basics of password cracking. You will practice using Hashcat to crack passwords using both brute force and dictionary-based techniques.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Evasion Basics
1
H
0
M

In this course, you will learn the basics of evasion in the context of penetration testing. You will learn common evasion techniques and tools for networks, hosts, and applications.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Local Host Enumeration
1
H
0
M

In this hands-on lab, you will learn the basics of local host enumeration. You will practice enumerating a Linux system using built-in commands and a Windows system using the WinPEAS script.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Identifying Ingress and Egress Rules
1
H
25
M

In this hands-on lab, you will learn the basics of identifying ingress and egress rules on a firewall. You will practice using Nmap to probe a live firewall in a simulated network environment and gather information about its rule configuration.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Tunneling and Pivoting
1
H
25
M

In this hands-on lab, you will learn about tunneling and pivoting as tactics for traversing target networks. You will practice tunneling and pivoting using Metasploit and SSH Dynamic Port Forwarding.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Evading Microsoft Defender
1
H
20
M

In this hands-on lab, you will learn about evading Microsoft Defender. You will practice using process injection and obfuscation techniques to evade Microsoft Defender.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Application Attacks Basics
1
H
10
M

In this course, you will learn the basics of applications and how to attack them, including web application architecture, common vulnerablities, and mitigation strategies.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Burp Suite Basics
1
H
20
M

In this hands-on lab, you will learn the basics of Burp Suite, a popular web application penetration testing tool. You will practice using some core features of Burp Suite to identify and exploit vulnerabilities in a web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Password Spraying and Credential Stuffing
1
H
35
M

In this hands-on lab, you will learn about password spraying and credential stuffing. You will practice using Hydra and Burp Suite to perform password spraying and credential stuffing attacks.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Injection Attacks
1
H
25
M

In this hands-on lab, you will learn the basics of injection attacks. You will practice performing SQL injection, command injection, and XSS attacks against a vulnerable web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
SSRF Attacks
1
H
20
M

In this hands-on lab, you will learn the basics of Server-Side Request Forgery (SSRF) Attacks. You will practice performing live SSRF attacks against a vulnerable web application.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Bypassing Web Application Firewalls
1
H
30
M

In this hands-on lab, you will learn about Web Application Firewalls (WAF) and common techniques for bypassing them. You will practice using manual testing techniques to bypass various WAF configurations.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Deserialization Attacks
1
H
20
M

In this hands-on lab, you will learn the basics of deserialization attacks. You will practice performing deserialization attacks using Python scripts and Burp Suite.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
API Attacks
1
H
30
M

In this hands-on lab, you will learn the basics of API Attacks. You will practice exploiting some common API vulnerabilities in a REST-based web application.

2

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Box Full of Recon
1
H
0
M

In this hands-on challenge, you will practice using Nmap to identify and exploit simple vulnerabilities on target hosts.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Penguin Land
1
H
0
M

In this hands-on challenge, you will practice performing local host enumeration and privilege escalation on a Linux system.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Scratch and Sniff
1
H
0
M

In this hands-on challenge, you will practice network sniffing. You will interpret and manipulate a packet capture to gain access to other hosts on a target network.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Tunnel Cake
1
H
0
M

In this hands-on challenge, you will practice identifying and exploiting vulnerabilities on a target host, then using tunneling and pivoting to broker access to internal services

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Crackception
1
H
0
M

In this hands-on challenge, you will exercise your password cracking skills to defeat the security of an encrypted file.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Spray Paint
1
H
0
M

In this hands-on challenge, you will exercise your password cracking and password spraying skills.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
The Defense Rests
1
H
0
M

In this hands-on challenge, you will practice making changes to a malware sample in order to evade Microsoft Defender.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
In-N-Out
1
H
0
M

In this hands-on challenge, you will practice identifying potential egress points through intermediate devices and creating tunnels out of a network.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Encoder Switch
0
H
30
M

In this hands-on challenge, you will practice exploiting SSRF vulnerablities and converting binary output.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Burping Sauce
1
H
0
M

In this hands-on challenge, you will practice using Burp Suite to exploit a vulnerable web application.

3

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Offensive Security Fundamentals
0
H
15
M

Test your Offensive Security Fundamentals knowledge to identify strengths, gaps, and weaknesses in areas like offensive security operations and cyber kill chains. Measure your mastery of Offensive Security Fundamentals and advance your career with targeted course recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Reconnaissance and Enumeration
1
H
10
M

Test your Reconnaissance and Enumeration knowledge and skills to identify strengths, gaps, and weaknesses in areas like OSINT, network reconnaissance, and local host enumeration.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Network Attacks
1
H
15
M

Test your Network Attacks knowledge and skills to identify strengths, gaps, and weaknesses in areas like reconnaissance, enumeration, exploitation, and more. Measure your mastery of Network Attacks and advance your career with targeted course and virtual lab recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Credential Attacks
1
H
10
M

Test your Credential Attacks knowledge and skills to identify strengths, gaps, and weaknesses in areas like Password Cracking, Password Spraying, and Credential Stuffing.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Evasion
1
H
10
M

Test your Evasion knowledge and skills to identify strengths, gaps, and weaknesses in areas like identifying ingress and egress rules, evading Microsoft Defender, and bypassing web application firewalls.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Application Attacks
1
H
0
M

Test your Application Attacks knowledge and skills to identify strengths, gaps, and weaknesses in areas like web application vulnerabilities and Burp Suite. Measure your mastery of Application Attacks and advance your career with targeted course and virtual lab recommendations.

4

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Instructors

Tyler Boykin
Principle Penetration Tester
Read Full Bio
Garret Donaldson
Lab Architect
Read Full Bio
Joseph White
Lab Architect
Read Full Bio
Matthew Mullins
Security Researcher - Adversary Emulation
Read Full Bio

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

Frequently Asked Questions

Who is this for?

This career path is designed for learners with a solid grasp of foundational IT, cybersecurity, and defensive security concepts who are interested in pursuing an entry-level offensive security role. This includes current mid-career IT and defensive security practitioners who are interested in transitioning to an offensive security role. 

Experienced offensive security practitioners will also benefit from reviewing core concepts and testing their skills in this path's Challenge and Assessment modules.

What are some Penetration Tester responsibilities and job requirements?

Penetration Testers seek to identify and resolve security vulnerabilities in an organization’s networks. This often involves creating new or improved security protocols. 

Common Pentester tasks and responsibilities include:

  • Performing penetration tests on computer systems, networks, and applications
  • Creating new testing methods to identify vulnerabilities
  • Performing physical security assessments of systems, servers, and other network devices to identify areas that require physical protection
  • Searching for weaknesses in common software, web applications, and proprietary systems
  • Identifying potential entry points attackers may use to exploit vulnerabilities or weaknesses
  • Documenting and discussing findings with IT and management teams
  • Reviewing and providing feedback for information security fixes
  • Staying up-to-date on the latest malware and security threats
Why is penetration testing important?

Penetration testing is an essential tool for identifying vulnerabilities in systems, networks, and applications before malicious actors can exploit them. By understanding a hacker’s mindset and tools, Penetration Testers can simulate real-world attacks to expose weaknesses and fortify security measures before it’s too late.

Pentesting not only helps prevent data breaches and other cyber incidents — it also ensures compliance with industry regulations and enhances overall risk management.

What jobs can I get as a penetration tester?

Professionals trained in penetration testing can pursue a variety of cybersecurity roles, such as:

  • Penetration Tester (Ethical Hacker)
  • Security Consultant
  • Vulnerability Analyst
  • Red Team Member
  • Cybersecurity Analyst

Pentesters are employed across various industries, including finance, healthcare, government, tech, and more.