Penetration and vulnerability tester

The penetration and vulnerability tester role includes a variety of mid-level information security positions focused on conducting formal tests to break into and exploit computer systems.

What does a penetration tester do?

Penetration and vulnerability testers require a thorough understanding of pentesting methodologies and vulnerability assessments, as well as the ability to exploit systems and effectively communicate findings.

It is one of three mid-level, core cybersecurity roles mapped directly to the National Initiative for Cybersecurity Education’s CyberSeek model.

Start learning today

EC-Council Certified Ethical Hacker (CEH)
Learning Path
EC-Council Certified Ethical Hacker (CEH)

EC-Council Certified Ethical Hacker (CEH)

The Certified Ethical Hacker (CEH) certification path teaches you the hacking skills necessary to successfully perform a penetration test. You’ll learn the techniques and tools used by cybercriminals and how to apply them to conduct security assessments and report your findings.

Ethical Hacking
Learning Path
Ethical Hacking

Ethical Hacking

The Ethical Hacking skill path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

CompTIA PenTest+
Learning Path
CompTIA PenTest+

CompTIA PenTest+

The CompTIA PenTest+ certification path teaches you how to successfully plan, carry out and report the results of a penetration test. You'll learn the process behind penetration testing, tools and techniques used by pentesters, legal and compliance issues and more.

Web Application Pentesting
Learning Path
Web Application Pentesting

Web Application Pentesting

The Web Application Pentesting skill path teaches you how to discover and exploit vulnerabilities in Web apps. You'll learn how to use popular penetration testing tools to perform an analysis of Web applications, assess their weaknesses and better defend them from malicious attacks.

Mobile Application Pentesting
Learning Path
Mobile Application Pentesting

Mobile Application Pentesting

The Mobile Application Pentesting skill path teaches you how to discover and exploit vulnerabilities in mobile apps. You'll learn how to use popular penetration testing tools to perform an analysis of mobile applications, assess their weaknesses and better defend them from malicious attacks.

Certified Expert Penetration Tester (CEPT)
Learning Path
Certified Expert Penetration Tester (CEPT)

Certified Expert Penetration Tester (CEPT)

The Certified Expert Penetration Tester (CEPT) certification path teaches you advanced hacking tools and techniques. You'll learn how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to defend your organization against advanced persistent threats.

Overview

Common job titles
  • Penetration tester
  • Application security architect
  • Application security analyst
  • Senior penetration tester
  • Security analyst III
U.S. job openings
  • 9,826
Most-requested skills
  • Information security
  • Penetration testing
  • Linux
  • Vulnerability assessment
  • Python
  • Information systems
  • Java
  • Open Web Application Security Project (OWASP)
  • Project management

You're in good company

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"The course not only met my expectations, but exceeded them. It was the most engaging online training I’ve ever had."

Val Vask

Commercial Technical Lead

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer