Penetration Tester

Build the skills a successful penetration tester — or ethical hacker — needs with our library of role-based courses and learning paths. Learn how to plan and perform authorized, simulated attacks within an organization’s information systems, networks, applications and infrastructure to identify vulnerabilities and weaknesses.

The role

What does a Penetration Tester do?

Penetration testers often specialize in a number of areas such as networks and infrastructures, Windows, Linux and Mac operating systems, embedded computer systems, web/mobile applications, supervisory control data acquisition (SCADA) control systems, cloud systems and internet of things (IoT) devices.

The details

Penetration Tester career paths

Domain knowledge

  • Exploitation analysis
  • Vulnerability assessment and management

Related job titles

  • Ethical hacker
  • Assurance validator 

Common certifications

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • Exploitation Analyst
  • Target Network Analyst
  • Threat / Warning Analyst

Plans & pricing

  • Infosec Skills Personal

    $299 / year

    • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Custom certification practice exams (e.g., CISSP, Security+)
    • Skill assessments
    • Infosec peer community support
  • Infosec Skills Teams

    $799 per license / year

    • Team administration and reporting
    • Dedicated client success manager
    • Single sign-on (SSO)
      Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
    • Integrations via API
      Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
    • 190+ role-guided learning paths and assessments (e.g., Incident Response)
    • 100s of hands-on labs in cloud-hosted cyber ranges
    • Create and assign custom learning paths
    • Custom certification practice exams (e.g., CISSP, CISA)
    • Optional upgrade: Guarantee team certification with live boot camps

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

FAQ

Frequently asked questions

  • What does a penetration tester do?
    • Penetration tester jobs require you to essentially act like a hacker and hack into your organization’s resources. If you were wondering “what is ethical hacking”, it is just this – ethical application of hacking skills. The purpose is to simulate a real hack and cyber security penetration testing is a safer way for organizations to gauge their security than to wait for a real-time hack. On a more granular level, pen testers identify security vulnerabilities in an organization’s digital and physical systems and policies.

  • How can I become a penetration tester or ethical hacker?
    • Penetration testers and ethical hackers use a combination of their work experience and ethical hacking skills that they have acquired to help land their first job in this role. The good thing is that you can learn various skills involved in penetration testing online for free.

  • What education does a penetration tester or ethical hacker need?
    • Whether your career path will require education is more a function of the job you are applying for than anything else. Some organizations hiring for the role of penetration tester or ethical tester do not have any education requirements, in which case certification is all you need. Other organizations do have an education requirement, so you will need both a degree and certification. For those that do require a degree, there is no one degree they require – whether it be the level of degree or the major.

  • What certifications does an ethical hacker need?
  • What skills does a penetration tester and ethical hacker need?
  • How much can a penetration tester earn?
  • Where do penetration testers or ethical hackers work?