Penetration & Vulnerability Tester

The Penetration & Vulnerability Tester role includes a variety of mid-level information security positions focused on conducting formal tests to break into and exploit computer systems. This role requires an understanding of penetration testing methodologies, vulnerability assessments and exploits. The Penetration & Vulnerability Tester is one of three mid-level, core cybersecurity roles mapped directly to the National Initiative for Cybersecurity Education’s CyberSeek model.

Overview

Common Job Titles
  • Penetration Tester
  • Application Security Architect
  • Application Security Analyst
  • Senior Penetration Tester
  • Security Analyst III
U.S. Job Openings
  • 9,826
Related Experience
  • Networking
  • Software Development
  • Systems Engineering
Skills Needed
  • Information Security
  • Penetration Testing
  • Linux
  • Vulnerability Assessment
  • Python
  • Information Systems
  • Java
  • Open Web Application Security Project (OWASP)
  • Project Management

Start Learning Today

Get Certified

Certification Training

EC-Council Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Live Boot Camp | On-demand Training

The Certified Ethical Hacker (CEH) certification path teaches you the techniques used by malicious, black-hat hackers. You’ll learn how to quantitatively assess and measure threats to information assets — and discover where your organization is most vulnerable to hacking.

Certification Training

Certified Expert Penetration Tester (CEPT)

Certified Expert Penetration Tester (CEPT)

Live Boot Camp | On-demand Training

The Certified Expert Penetration Tester (CEPT) certification path teaches you advanced hacking tools and techniques. You'll learn how to successfully attack fully patched and hardened systems, how to circumvent common security controls, and how to defend your organization against advanced persistent threats.

Certification Training

Certified Mobile and Web App Penetration Tester (CMWAPT)

Certified Mobile and Web App Penetration Tester (CMWAPT)

Live Boot Camp | On-demand Training

The Certified Mobile and Web App Penetration Tester (CMWAPT) certification path teaches you skills, tools and techniques required for conducting comprehensive security tests of mobile devices and Web applications.

Certification Training

Certified Red Team Operations Professional (CRTOP)

Certified Red Team Operations Professional (CRTOP)

Live Boot Camp

The Certified Red Team Operations Professional (CRTOP) certification path teaches you how to better defend your organization by learning to think like a cybercriminal. You’ll learn to defend against a variety of attacks against your organization — from network vulnerabilities to social-engineering tactics.

Improve Your Skills

Skill Training

Ethical Hacking

Ethical Hacking On-demand Training

Coming Soon!

The Ethical Hacking skills path helps you master a repeatable, documentable penetration testing methodology. You'll learn how to use the same techniques used by malicious hackers to carry out an ethical hack and assess your organization's vulnerabilities.

Skill Training

Advanced Ethical Hacking

Advanced Ethical Hacking On-demand Training

Coming Soon!

The Advanced Ethical Hacking skills path is designed to take your penetration testing skills to the next level. You'll learn how to write custom exploit code, use chained exploits to pivot from multiple exploitable systems, exploit secured web applications and more.

Skill Training

Scripting

Scripting On-demand Training

Coming Soon!

The Scripting skills path teaches you how to use scripts for penetration testing, including Python, PowerShell and Bash.

Skill Training

Advanced Exploitation Techniques

Advanced Exploitation Techniques On-demand Training

Coming Soon!

The Advanced Exploitation Techniques skills path teaches you how pivoting, privilege escalation and password cracking are used to exploit targets.

Skill Training

Web Application Pentesting

Web Application Pentesting On-demand Training

Coming Soon!

The Web Application Pentesting skills path teaches you how to discover and exploit vulnerabilities in Web apps. You'll learn how to use popular penetration testing tools to perform an analysis of web applications, assess their weaknesses and better defend them from malicious attacks.

Skill Training

Mobile Application Pentesting

Mobile Application Pentesting On-demand Training

Coming Soon!

The Mobile Application Pentesting skills path teaches you how to discover and exploit vulnerabilities in mobile apps. You'll learn how to use popular penetration testing tools to perform an analysis of mobile applications, assess their weaknesses and better defend them from malicious attacks.

Skill Training

Red Team Operations

Red Team Operations On-demand Training

Coming Soon!

The Red Team Operations skills path teaches you how to do good by being bad. You'll learn the technical and non-technical ways that cybercriminals attempt to compromise an organization — and how to use that knowledge to conduct a red team assessment.

What Our Students Are Saying

"Excellent Instructor with superior knowledge in his profession — a Jedi Master. ... He provided Proof of Concept for every exploit or task by demonstrating how and why they worked. The course was taught in a way where all students could comprehend and digest the information without issue. He kept the course interesting, fun and challenging. A special thanks for your wisdom, patience and passion for the profession."

Andrew Jones

US Army

See More Testimonials