The Professional Hackers Blueprint
The Professional Hackers Blueprint
To Sum Up 68-69
Page 1 WWW.STATIONX.NET
How to Become a Penetration Tester
Easily, the most frequently asked question we receive at StationX is, “How do I become a
penetration tester?”
You may already know that it’s an exciting, well-paying, and in-demand career. Or, you may only
have recently piqued an interest in hacking for a living. Either way, without some guidance, knowing
where to start can be very dif cult.
At StationX, we have trained over 500,000 students in cyber security. Now, we’ve assembled this
guide to help you on your journey to becoming a penetration tester and ethical hacker.
We will walk you through the hard and soft skills needed for this job, how to get training, what
professional certi cations to pursue, how to get a mentor, and prepare you for interviews.
By the end, you will have all the tools and knowledge you need to start your journey toward an
exciting and rewarding career as a penetration tester.
A Penetration Tester, sometimes known as an ethical hacker, is an individual that tests the security
of a client system or network by attempting to hack into it.
Page 2 WWW.STATIONX.NET
How to Become a Penetration Tester
Using the same tools, tricks, and techniques as the bad guys, a pen tester searches for security
weaknesses and attempts to break into the client system.
The client will almost always have a speci c goal and a limited testing scope. Based upon the
agreement with the client, they may want you to try and get to a particular database that holds
important information or to take over their domain controller and, thus, their entire system.
They may specify that you cannot use a technique like social engineering because they are only
concerned with technical miscon gurations. Or they may tell you that you can’t test their
production server since accidental harm or downtime to that system could cost them money.
All these limitations and goals will be clearly laid out before testing begins.
Page 3 WWW.STATIONX.NET
How to Become a Penetration Tester
There are two major differences between an ethical hacker and a criminal hacker.
Firstly, the ethical hacker has a client’s written permission to hack their network, often
working within a permitted scope of testing (such as certain parts of a network being off-
limits or banning certain types of attacks that may damage the company’s uptime).
The second difference is a criminal hacker will often attempt something destructive, such
as stealing valuable information like intellectual property or passwords, releasing malware
or ransomware, or taking down the system and making it unusable. An ethical hacker stops
before that point and assembles an audit report for the client.
The differences between ethical and criminal hackers are addressed further in our "What Is
a Red Hat Hacker?" article.
An audit report is what the client is after: A clear summary of the security weaknesses, how they
can be exploited, and most importantly, how they can be remediated.
If you are already familiar with the roles, salaries, and speci cs of the career, you can jump straight
to Steps to Becoming a Penetration Tester.
Looking below, we can see how vast the cyber security landscape really is. Keep in mind this is only
a high-level overview - there is way too much information to include all in one chart, but let’s keep
it simple for now.
Page 4 WWW.STATIONX.NET
How to Become a Penetration Tester
Some careers will fall neatly into one domain. Penetration testing is certainly an exception. Looking
below, we’ll see all the different areas it can cover.
Each of these domains consists of multiple skills, knowledge bases, and elements. See our
detailed descriptions below.
Security Architecture:
Security architecture is a comprehensive security design that considers both the
requirements and potential hazards present in a particular situation or environment.
Additionally, it details where and when to implement security controls.
Page 5 WWW.STATIONX.NET
How to Become a Penetration Tester
Network Security: Assuring the con dentiality, integrity, and availability (referred to as
the CIA Triad) of a network or system. Penetration testers will attempt to counterman
the protections clients and vendors put into place to keep the CIA Triad in place.
Patch Management: Ensuring all the latest updates and security xes are in place on
systems and programs. Penetration testers often look for out-of-date systems and
missing security patches to attack and gain a foothold on a system.
Baseline Con guration: “A set of speci cations for a system, or Con guration Item (CI)
within a system, that has been formally reviewed and agreed on at a given point in
time, and which can be changed only through change control procedures. The baseline
con guration is used as a basis for future builds, releases, and/or changes.” (NIST SP
800-128 under Baseline Con guration).
Pentesters will test the security of baseline con gurations and help create one that is
more secure for the client.
Page 6 WWW.STATIONX.NET
How to Become a Penetration Tester
Certi cate Management: Monitoring, enabling, and executing digital SSL certi cates
are all parts of certi cate administration. It is essential to the continued operation,
encryption, and security of client-server connections.
Key and Secret Management: Key and secret management is the safe and easy storing
of API keys, passwords, certi cates, and other private information. Use it to manage,
access, and audit information meant to be kept secret.
Page 7 WWW.STATIONX.NET
How to Become a Penetration Tester
The growing popularity of cloud-based systems has made them an attractive target for
hackers and bad actors. Pen testers have unique methods to test and protect these
systems.
Identity and Access Management: “Identity management (IdM), also known as identity
and access management (IAM), ensures that authorized people – and only authorized
people – have access to the technology resources they need to perform their job
functions.” (VMWare)
Pen testers see if they can beat identity management by forging/assuming the necessary
identity, creating a new one with authorization, or bypassing it entirely.
Application Security:
The process of developing and testing application security features to prevent
vulnerabilities and defend against attacks.
Source Code Scan: When performing a “white-box test,” penetration testers are given
access to internal information not available to the public, including the source code of
the systems and software they are testing. This allows them to review the code and
more ef ciently look for vulnerabilities resulting from mistakes in the programming.
Page 8 WWW.STATIONX.NET
How to Become a Penetration Tester
OWASP Top 10: A reference standard for the most critical web application security
risks. Ethical Hackers will use this standard as a reference guide to test a client’s
system.
NIST Cyber Security Framework: A set of best practices and recommendations for
cyber security from the National Institute of Standards and Technology.
Physical Security:
Physical Security limits access to areas where data and system controls are located.
Fences, gates, security personnel, cameras, RFID badges, locks, etc., can keep out cyber
criminals who wish to get on-premises and access data/devices directly.
Page 9 WWW.STATIONX.NET
How to Become a Penetration Tester
IoT Security: The testing and security of Internet of Things (IoT) devices such as “smart
home” systems. IoT devices are notoriously insecure, many lacking proper encryption
and security controls or using very simple default passwords. Penetration testers will
test the security of these systems and attempt to use them as a springboard into other
client systems.
Risk Assessment:
Determining a system's security risks, including the vulnerability's severity and potential
impact if exploited.
Vulnerability Scan: A wide scan, usually using an automated tool such as Nessus, to
look for known vulnerabilities and security risks; often one of the early steps in a
penetration test.
Red Team: A speci c penetration testing team of ethical hackers who attempts to fully
simulate a real attack and stay undetected.
A standard penetration test can be similar to a house inspection where people know you
are there and your purpose; in a red team test, you stay hidden from the security team
and do not leave any traces. As a result, red team engagements often run longer than a
standard pentest but more accurately simulate a real threat actor.
Page 10 WWW.STATIONX.NET
How to Become a Penetration Tester
Application Pen Tests: The security testing of an “application,” typically a website, but
can extend to applications used for blockchain, eCommerce, APIs, front and back-end
servers, etc.
Social Engineering: The manipulation of a human to convince them to act against their
own self-interest or the interest of the company through deception.
Bug Bounty: The open call for testing vulnerabilities or bugs in an application. These
are often held by either the client organization directly or through a broker, such as
Bugcrowd.
User Education:
Educating end-users on cyber security practices and training individuals in any of the cyber
security domains, such as ethical hacking, cyber forensics, and malware analysis.
Cyber Security Table-Top Exercise : Meetings used to walk through security incidents,
how to prepare for them, and how to respond when they occur. Usually the domain of
the defensive security team, this can be done as part of the pentest debrief or as a
stand-in for systems too sensitive to risk active testing.
Page 11 WWW.STATIONX.NET
How to Become a Penetration Tester
Governance:
Establishing a system for cybersecurity governance guarantees that a company's security
programs align with its business goals, adhere to rules and regulations, and meet goals for
managing security and risk.
Pentester/Penetration Tester
Junior Penetration Tester
Penetration Tester Trainee
Senior Penetration Tester
Penetration Tester Team Lead
Ethical Hacker
White Hat Hacker
Red Teamer
Vulnerability Tester
Security Tester
Page 12 WWW.STATIONX.NET
How to Become a Penetration Tester
Career Path
Now that we have a better understanding of what a pen tester is, let’s examine the career path you
can take with this role.
Page 13 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 14 WWW.STATIONX.NET
How to Become a Penetration Tester
Feeder roles can be considered entry-level jobs that are easier to attain without previous
experience but can still lead to a cyber security career. They provide enough industry experience
and exposure to make upward mobility to more complex positions easier. Often, you can begin
requesting security-related tasks or shadow someone working in the security department as a
launching pad to your ideal career. A quick overview of the different feeder roles shown above:
Support Desk is a common entry point for IT professionals who troubleshoot employee
or customer desktops, phones, and other systems.
IT Roles can include anything related to networking and systems administration. You
might assist the network administrator, roll out new hardware to staff, set up switches
and network devices, etc.
Systems Administrator is a bit more technical than the IT roles, such as setting rewall
rules, managing user accounts in Active Directory, etc. Several entry-level roles will
provide this hands-on training.
Graduates from college or university programs can get an entry-level position based on
their degree.
Internships can offer hands-on experience and training and may lead to a position within
the organization.
Proven Ability of your skillset through professional certi cations, involvement in the
infosec community (through blogs/GitHub/YouTube/etc.), competitive CTF (Capture The
Flag) events, and more can get you noticed by employers.
Page 15 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 16 WWW.STATIONX.NET
How to Become a Penetration Tester
Stage 1 - Essential IT
You start at Stage One if you have zero (or almost zero) IT and cyber security knowledge and need
to start from scratch. Here is where you gain a reasonable understanding of Windows and maybe
Linux and Mac. You learn PCs, ports, le management, basic networking, .etc. You learn to set up
and con gure operating systems and troubleshoot IT problems. You might pursue certi cates like
CompTIA’s ITF or A+.
Stage 2 - Networking
Enter Stage Two when you have your essential IT skills and need to learn TCP/IP, routers,
switches, and the Internet. You might pursue certi cates like CompTIA’s Network+.
Page 17 WWW.STATIONX.NET
How to Become a Penetration Tester
CompTIA Network+ Cert. Cisco New CCNA (200- The Only IP Course You
(N10-008) The Total 301): DELUXE Will Ever Need!
Course
Enter Stage Three when you have experience working with all the previously mentioned topics and
have good experience with IT, networking, and applications. You might hold IT fundamentals, A+,
or a technology degree, or have worked in IT support.
At the end of Stage Three, you will have knowledge/experience of topics like encryption,
authentication, threats and vulnerabilities, basic hacking, OS security, .etc. You might have
quali cations already, like CompTIA’s Security+, CEH, or ISC(2)’s SSCP.
Page 18 WWW.STATIONX.NET
How to Become a Penetration Tester
If you’re not at Stage Three yet, don’t worry. Consider some of our fundamental courses to get up
to speed, such as CompTIA A+ Core 1 and Core 2, Network+, and Security+. If you’re ready to start
Stage Four, keep reading.
After completing Stage Three, you move towards gaining a deeper knowledge of penetration
testing and hacking. Here you may choose to specialize in an area of penetration tesing, like web
apps, mobile, red team, and so on. You might pursue certi cates like
Page 19 WWW.STATIONX.NET
How to Become a Penetration Tester
It’s time for Stage Five when you have ve+ years of working as a pen tester and want to become
an expert in a specialist area. For example, you are a penetration tester who wants to move into
reverse engineering and create custom exploits. You might pursue certi cates like
After all of the legal requirements are settled with the client, which you as an ethical hacker may or
may not be directly involved in (your company may have a legal and sales department for the
contractual end), you will be tasked with actively testing for known vulnerabilities and
miscon gurations which could harm the client.
There will be a prede ned scope for testing, such as some systems being considered off limits,
whether or not things like DDoS (distributed denial of service) attacks or social engineering are
allowed, what days or hours testing can occur, and what the speci c goals of the test are.
Page 20 WWW.STATIONX.NET
How to Become a Penetration Tester
The pen tester will typically follow a pattern of information gathering, scanning and enumeration,
exploitation and gaining access, maintaining access, and further information gathering so you can
escalate control over the compromised system and pivot to other systems within the network.
Page 21 WWW.STATIONX.NET
How to Become a Penetration Tester
There are many types of penetration tests, including but not limited to external, internal, assumed
breach, web app, physical, and wireless.
Once the testing phase is complete, the penetration tester will organize all of the documentation
they’ve taken during the testing and assemble a report showing what the vulnerabilities were, how
they were exploited, proof, the risk level to the client, and how their IT department can mitigate
the threat.
Page 22 WWW.STATIONX.NET
How to Become a Penetration Tester
As with any career, the average salary can vary depending on the speci cs of the role, the location
you are working, and your individual experience. But let’s take some statistics from various sources
to assemble a more complete picture.
Page 23 WWW.STATIONX.NET
How to Become a Penetration Tester
According to ZipRecruiter, as of October 3, 2022, the average annual salary of a penetration tester
in the United States is $118,340 per year (averaging $57/hour).
“While ZipRecruiter is seeing annual salaries as high as $173,000 and as low as $63,000,
the majority of Penetration Tester salaries currently range between $97,500 (25th
percentile) to $135,000 (75th percentile) with top earners (90th percentile) making
$156,000 annually across the United States.”
According to the book, “Hack the Cybersecurity Interview” by Ken Underhill, Christophe Foulon,
and Tia Hopkins (Published July 2022):
Page 24 WWW.STATIONX.NET
How to Become a Penetration Tester
“I’ve seen salaries as low as $76,000 and as high as $270,000+ for specialized public sector work.
For a junior-level pentester, you can usually expect between $70,000 and $100,000…”
Payscale lists the average annual salary for a junior pentester at $70,000 USD.
Page 25 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 26 WWW.STATIONX.NET
How to Become a Penetration Tester
The phrase “junior penetration tester” on LinkedIn showed 29,453 positions available in the
United States, 2,717 in the United Kingdom, and 868 in Canada.
According to Rob Sobers in his Varonis article, “166 Cybersecurity Statistics and Trends,” as of
February 2022, there are nearly 600,000 job openings in the cyber security industry (only 68% of
open jobs are lled), and 40% of IT leaders say cyber security jobs are the most dif cult to ll.
Moreover, by 2025 there will be 3.5 million un lled cyber security jobs globally.
A 2022 industry report projects that the global cyber security market is projected to grow to USD
$345.4 billion by 2026.
Similar studies, such as Forbes’ “Alarming Cyber Statistics for Mid-Year 2022 That You Need To
Know” and Comparitech’s “300+ Terrifying Cybercrime and Cyber security Statistics (2022
Edition),” show the need for cyber security auditors and pen testers is only growing.
All of us are part of a global economy completely reliant on the sustained functionality of our
modern technology. Cybercriminals, terrorists, and enemy nations are aware of this.
Page 27 WWW.STATIONX.NET
How to Become a Penetration Tester
In 2016, Maersk, the largest shipping container company in the world, was a victim of a
cyber attack that took down almost 50,000 endpoints across 600 sites in 130 countries
for ten days. This cost the company more than $300 million and damaged its reputation.
Becoming more reliant on this technology and moving more business to the digital realm creates a
larger and more tempting attack surface for those threat actors with an agenda ( nancial, political,
or otherwise).
The importance of penetration testing to secure these networks cannot be understated. That said,
there is a factor we haven’t addressed yet. Technology is under constant development to assist and
strengthen both the defender's and the attacker’s sides. As with any technology, the more the
process can be automated, the easier it is to use and the more attractive it becomes.
We see the implementation of Arti cial Intelligence in elds we’ve never considered in the past.
We have seen A.I. generate artwork (much to the displeasure of artists and designers), write
ction, act as a knowledge resource, and be integrated into different security systems (such as the
new Microsoft Security Copilot).
We cover how to utilize ChatGPT as an ethical hacker in our article "Unlock ChatGPT for Hacking:
Jailbreaking Ethical Restrictions." It can be used to write malicious code, provide possible
solutions when a pen tester is stuck, assist in writing social engineering campaigns, and more.
Page 28 WWW.STATIONX.NET
How to Become a Penetration Tester
We have also witnessed how worms like NotPetya and BadRabbit combined a common
vulnerability with a penetration testing tool (EternalBlue and Mimikatz, for those
interested) to fully automate their rampage to great effect. This did not require anything as
complex as A.I.
The big frightening question is, "Will A.I. replace ethical hackers?"
We can’t dismiss the possibility completely. In our opinion, Arti cial Intelligence will take a bigger
role in cyber security, both for attackers and defenders, but the need for human pentesters will
remain. Penetration testing and ethical hacking requires a certain level of creativity not yet met by
A.I.
Much like the various vulnerability scanners available on the market, A.I. is likely to assist in basic
enumeration and information gathering but will still require a knowledgeable human pen tester to
prompt it and know what to do with the gathered information. We believe it will become an
indispensable tool in a hacker's arsenal, but a tool nonetheless.
The key soft skills we discussed included analytical thinking, attention to detail, and problem-
solving. Are you that type of person? If you enjoy puzzles, problem-solving, troubleshooting, and
breaking down issues into smaller pieces to work through, this may be a career that inspires you.
Page 29 WWW.STATIONX.NET
How to Become a Penetration Tester
We also discussed communication skills, collaboration, and honesty. It might seem odd that these
are more emotional traits than analytical ones, yet they sit side-by-side with each other as
important traits in this eld. Why is that?
The paper used “Holland’s RIASEC model” to determine personality types. It assumes six
vocational personalities.
Realistic
Investigative
Artistic
Social
Enterprising
Conventional
“Cyber security competition participants score highest in the investigative, social, and artistic
areas, which differs to some extent from other computer science-related groups. The social
aspects of group competition and the creative aspects of cyber security problem solving may
explain this difference.”
Page 30 WWW.STATIONX.NET
How to Become a Penetration Tester
Cyber security's creative problem-solving aspects require more artistic traits than other computer
science elds. This makes sense when you compare the role to that of a cloud architect or network
administrator, which requires less “outside-the-box” style thinking.
A pen tester is also tasked with communicating their ndings to individuals across a wide spectrum
of technical knowledge, from executives who only know the basics of using the internet to IT
administrators and network engineers who are expected to apply your suggested xes. These are
certainly social skills.
There are several sites online where you can take Holland’s RIASEC assessment to see your
vocational code. Try a few and see if you return an ISA or IAS code.
This eld is constantly changing, and you will need to keep up with it. It’s not dif cult so much as it
is a demand of dedication.
You must keep learning new technologies, techniques, systems, and vulnerabilities. There will be
lots of very dull and sometimes poorly explained documentation you will need to read. And you
may nd yourself working odd hours if the client demands it.
If these notions scare you off, that’s perfectly ne. It just means that penetration tester may not be
the eld for you. If this all sounds up your alley, you may have found a calling.
Page 31 WWW.STATIONX.NET
How to Become a Penetration Tester
Take our quiz to see if penetration tester is the career path for you!
This is why you’re here. Your interest has been piqued, and you want to take the next steps. But
this is a eld that many don’t know exists. We’re fairly certain that a career or high school guidance
counselor didn’t suggest this particular occupation. So, where do we begin?
Let’s break down the required skills and quali cations and show you how to create a roadmap to
success.
Find a mentor
Why get a mentor?
When you are rst starting any career journey or learning a new technical skill/trade, you don’t
know what you don’t know. It isn’t as simple as Googling how to take your next step if you’re not
sure what next steps to take. A mentor can tell you how to get started.
Page 32 WWW.STATIONX.NET
How to Become a Penetration Tester
There are so many courses and certi cations for penetration testing you can take, but some are not
worth pursuing, while others are almost industry standards. A mentor can tell you which is which.
They can tell you how to gain experience that you can show employers and how to make
worthwhile connections in the industry.
A mentor isn’t just someone who will teach you the hard skills - though it’s great if you can nd
that person. A mentor can tell you what skills are in demand right now and offer advice on learning
and studying these topics. They can tell you what worked for them and what didn’t, how they
succeeded and why they failed, and what route they would take if they were starting over.
The group will periodically meet to share ideas, create accountability, support each other, and grow
to succeed. At StationX, you can join a mastermind group and meet as often as you want (though
we recommend weekly) to assist each other in achieving your career and educational goals.
They have been proven to help you establish good habits to achieve your goals and increase your
learning retention rates.
Page 33 WWW.STATIONX.NET
How to Become a Penetration Tester
Whether you are a student or a professional, it’s been observed that those who had
written their goals down had an increased chance of achieving them – a 42% vs. 60%
success rate.
Committing publicly to your goals creates a sense of personal accountability, bumping the
completion percentage to 64%.
In StationX Mastermind groups, we recommend you meet weekly. By doing this, the goal
completion rate shoots up to 76%.
When you discuss what you’re learning with others, just talking about it can actually
increase your retention rate to 50%.
Even better, teaching others what you’ve learned increases your retention rate to 90%.
Building a network provides career support, advice, and new perspectives. It helps you reevaluate
your skills and knowledge base. It also assists you in growing your personal brand and
establishing a stronger professional name for yourself.
Page 34 WWW.STATIONX.NET
How to Become a Penetration Tester
Everyone in your network is a resource library, and building one full of individuals who share a
passion for cyber security means you gain access to a very niche source of information.
You can join the StationX community and connect with other students, experts, and junior
professionals.
LinkedIn is an excellent platform to reach out to others, as some individuals clearly state that they
want to connect with others in their eld. Recruiters will almost always accept connection
invitations. Many people post articles and blogs discussing their eld of expertise; by responding to
them on the subject, you can open a dialogue and build a connection.
You can connect with Nathan House, founder and CEO of StationX, and share his professional
network. You can also follow StationX on LinkedIn.
Infosec Twitter is full of professionals who love to share insights, tips, and technologies. As an
open platform, you can retweet and reply to these posts. Sharing your insights, struggles and
successes can garner attention and help build your network. Be sure to follow Nathan House and
StationX.
There are many industry events and meetups, both large and small, that happen all year round.
See what is happening in your area. You can plan to travel to some of the larger conferences. Many
of these also happen completely online (such as over Discord) due to Covid.
Let’s talk about skills and capabilities. You are going to need to think about what skills and abilities
you have that apply to this role and which need to be developed.
We’ll start by looking at possible specializations you may be interested in within pentesting,
identifying your current skillset, and analyzing what you need to work on.
Page 36 WWW.STATIONX.NET
How to Become a Penetration Tester
Exploit Developer
While most penetration testing specialties do not require advanced
programming, writing exploits will require knowledge of Python and C at a
minimum. 32-bit Assembly, Ruby, Powershell, debugging, and reverse
engineering will also be skills you are likely to develop. See our exploit
developer course.
You can also specialize in hacking Active Directory, WiFi, cloud infrastructures such as Azure and
Amazon Web Services, SCADA/ICS systems, and more.
Page 37 WWW.STATIONX.NET
How to Become a Penetration Tester
You can also get to know the cyber security industry and what jobs are offered with this free career
guide.
Once you’ve taken a good hard look at what you have to offer in terms of hard skills (such as Linux
or TCP/IP) and soft skills (like time management and report writing), it’s time to line them up
against the skills you see listed on the kinds of job ads you want to apply for. Determine what is
missing, and set a plan to ll in the gaps.
We’ve created a tool to help you with this task, but use whatever method works best for you so
long as you can refer back to it and update as needed.
To use our “Capabilities Matrix with Gap Analysis”, click here and make a copy for yourself.
The document is split into two sections: “My Current Capabilities” tab and “Capabilities I Need” tab.
Begin by lling out the Capabilities column in the Current Capabilities tab.
Page 38 WWW.STATIONX.NET
How to Become a Penetration Tester
1. Hard capabilities, which are formal technical skills (e.g Python or TCP/IP)
2. Soft capabilities, which are developed through experience (communication skills,
adaptability, etc.)
3. Transferable skills are skills developed in other pursuits that can translate to this
career (a mechanic might have problem-solving skills or attention to detail)
List a maximum of ten for each. Then, move on to the other columns.
Page 39 WWW.STATIONX.NET
How to Become a Penetration Tester
First, you will select the knowledge level (beginner, intermediate, or advanced). This refers to your
understanding of the capability.
Next is your skill level (beginner, intermediate, or advanced). This is your ability to apply
knowledge to a task or situation.
At the bottom, you can list any certi cations, degrees, or provable achievements.
The second tab is “Capabilities I Need”. It is laid out the same as the previous table.
Here, you review the job descriptions of the positions you want. Perform a gap analysis on the
junior/entry-level position you’re after. In this case, a junior penetration tester.
Page 40 WWW.STATIONX.NET
How to Become a Penetration Tester
You can also consider mid and advanced-level positions, so you know the direction you want to
move towards in the long term.
Fill in the hard and soft capabilities you frequently see in job postings and our recommended skills
and certi cations in the next sections.
There you go! Once completed, you’ve created a clearly de ned list of hard and soft skills you need
to learn and quali cations you need to earn to become a penetration tester. You have your
direction. Now, let’s talk about gaining those skills.
Pen testers are expected to have a wide array of skills. Don’t be intimidated by this, but recognize
that this job weighs hard technical skills with almost equal value as soft skills.
Remember, hacking gets you the information you need for your report, but your writing and
presentation are what gets you paid.
Page 41 WWW.STATIONX.NET
How to Become a Penetration Tester
We’re not just referring to Windows and Linux desktop environments. Websites, VoIP phone
systems, mobile devices, routers, Active Directory, Azure environments, SQL databases, and many
other systems and infrastructures need testing.
When looking at job ads, the most requested hard skills by employers are:
Networking
Information Security
Penetration Testing
Linux
Active Directory
Python
Java
Vulnerability Assessment
Information Systems
Software Development
Project Management
Page 42 WWW.STATIONX.NET
How to Become a Penetration Tester
Some of these required skills are very broad and general. “Networking,” for example, can mean
many things. To illustrate this, Cisco has ve levels of certi cation (Entry, Associate, Professional,
Expert, and Architect) and nine different learning paths. All of those are “Networking,” but they are
not equal.
There is a huge difference between a Cisco Certi ed Network Associate (CCNA) and a Cisco
Certi ed Internetwork Expert (CCIE). Salary alone differs by roughly $50,000 per year between the
two.
So, let’s break down these skills and de ne them into more concrete and actionable topics.
Networking
In this context, we de ne networking as understanding how devices communicate.
This can be done physically through network devices, such as switches and
routers. It can also be done virtually through cloud and virtualization technology (of
course, physical devices are still required to access the network).
You don’t need to be a networking engineer, but you should understand the
fundamentals of enterprise networking. A CompTIA Network+, Cisco CCNA, or
Juniper JNCIA equivalent knowledge base is suf cient. Read our Network+ vs
CCNA article to help determine which is best suited for you.
Page 43 WWW.STATIONX.NET
How to Become a Penetration Tester
Penetration Testing
We will discuss training in detail below.
Linux
96.3% of the world's top 1 million servers run on Linux. 90% of all cloud
infrastructure operates on Linux. In most cases, you will use a Linux operating
system (such as Kali, Parrot, or Black Arch) to perform your testing. Get used to
Linux!
Active Directory
90% of the Global Fortune 1000 companies use Active Directory, which means
you will most likely be attacking it. Learn how it works.
Python
The majority of modern exploits are written in Python. It is a simple yet versatile
scripting language, capable of being run natively on Linux and macOS, and can be
set up on Windows machines. While you don’t need a programmer’s skill level,
you should be able to look at Python script and understand it well enough to do
simple modi cations.
Page 44 WWW.STATIONX.NET
How to Become a Penetration Tester
Java
Java is mainly used in web applications. More and more software has become web-
based, and web-app pentesting has become a vast and lucrative eld, making a
background in Java valuable.
Vulnerability Assessment
Vulnerability assessment is determining if a vulnerability is a real threat and, if so,
how to mitigate it. Vulnerability scanning tools like Nessus and Qualys can speed
up the discovery of vulnerabilities and provide a risk score so you can more easily
prioritize which to x rst and which you may consider acceptable risk.
Information Systems
"Information Systems" can mean different things in different contexts. In this
context, we're talking about any device that can access and interface with a
network.
From a penetration testing perspective, understanding what registry entries in
Windows systems are for, how operating systems store user accounts and
passwords, typical default credentials used by different manufacturers, and how to
tell what version of Linux a host is running are all information a hacker can use in
their attacks.
Software Development
There are different skill levels in software development.
Page 45 WWW.STATIONX.NET
How to Become a Penetration Tester
You won't need to know too much coding as a junior pen tester.
An exploit developer requires a signi cant understanding of programming and
how operating systems work "under the hood."
Web app pentesters will want to understand PHP, Java, and SQL. They may be
given the application's source code to review and x the aws they’ve found.
Even at a basic level, most modern public exploits are written in C or Python, but
Perl and Ruby are not uncommon. Many penetration testing tools for Windows
systems are written in Powershell. Many will require some changes before they
will work.
You don't need to be an expert in everything, but at a minimum, you should be
able to look at code and follow what it's doing.
Project Management
While you wouldn’t need to pursue PRINCE2 or Project Management Professional
certi cations, the ability to look at a project, break it down into reasonable
milestones, and see it through is important. Many steps, from initial contact with
the client to the nal debrief, need to be taken. Even the testing itself comes in
stages.
Container Security
Comprehensive Software Security
Threat Hunting
Page 46 WWW.STATIONX.NET
How to Become a Penetration Tester
Time to learn the hard skills. Let’s take a look at the diagram above one more time. The courses
below will give you the skills and knowledge you should gain in Stage Four.
Again, you should have a strong understanding of IT basics, operating systems, networking, and
security fundamentals of Stages One through Three.
If you’re ready for the next steps, we recommend taking the following courses in this order:
Page 47 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 48 WWW.STATIONX.NET
How to Become a Penetration Tester
This is a text placeholder - Kali Linux Web App Reverse Engineering with
click this text to edit. Pentesting Labs Radare2
Page 49 WWW.STATIONX.NET
How to Become a Penetration Tester
All our hacking and penetration testing courses are here. You have full access to them when
joining with a StationX membership.
We have an article on our favorite ethical hacking books worth reading. Even if you don't build up a
complete personal library, having some key choices as reference material is highly valuable.
Page 50 WWW.STATIONX.NET
How to Become a Penetration Tester
Interpersonal and communication skills: The most important skill on this list. You are
working with clients. They trust you with their network. They are looking to you and
your expertise to protect themselves. In some cases, you are pitching the service.
Learn this skill!
Page 51 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 52 WWW.STATIONX.NET
How to Become a Penetration Tester
You will often use publicly available code referred to as “exploits”. These public exploits are often
written in either Python or C (primarily Python). Without knowing what the exploit is actually
doing, ring it on a client system is a huge risk.
If you aren’t con dent enough in your ability to read the code, you can’t use it safely.
Web application penetration testing, as mentioned earlier, makes up a large percentage of the
penetration testing landscape. Java and PHP are common in this discipline. Knowing these
languages makes you a better pentester and allows you to tell a client what speci cally needs to
be xed to secure their code.
Bash and PowerShell are scripting languages used by Linux and Windows systems respectively.
Python, as we already mentioned, is a scripting language commonly used in pentesting and is used
by network admins to roll out mass changes to a system, especially in cloud environments. You will
be using these daily as a pentester.
Lastly, any public code that can be used by hackers has likely been cataloged by at least some of
the major antivirus and security companies. Making changes to avoid detection, or at much more
advanced levels, actually coding your own tools, will make you a much stronger ethical hacker.
We would also say that learning Python is one of the best ways to grow your skills and advance
your career.
Page 53 WWW.STATIONX.NET
How to Become a Penetration Tester
CompTIA Security+
Certi ed Information Systems Auditor (CISA)
Certi ed Information Systems Security Professional (CISSP)
Various SANS/GIAC certi cations
While these are some of the most common certi cations seen in job postings, we want to be clear
that our recommendations only partially align with this list.
Security+ is an excellent certi cation to get if you’re a beginner because it covers the fundamentals
of information security. Having this certi cation tells employers you understand the terminology
and are knowledgeable in a wide variety of security practices. Our Security+ Exam Cheat Sheet and
10 Tips to Pass the CompTIA Security+ Exam article can help you with this goal.
CISA and CISSP, by contrast, are NOT entry-level certi cations. These are for individuals looking to
move from an intermediate to an advanced career level.
You should pursue CISSP as a certi cation in your career. CISSP is the closest there is to an
industry-wide standard certi cation and should be the goal of anyone wanting a career in
information security. That said, it is not for those just starting in cyber security.
Page 54 WWW.STATIONX.NET
How to Become a Penetration Tester
It is also worth noting that SANS certi cations are very expensive, and it is common for those in
the industry to request employers pay for the training and certi cation rather than the individual
get it themselves.
CEH and Pentest+ are very similar to each other. We compared the two in our Pentest+ vs CEH
article. In summary, Certi ed Ethical Hacker appears more often on job postings, while Pentest+ is
more affordable and covers a more complete and well-rounded curriculum. Both are DoD directive
8570 approved. Pick the one you feel is right for you.
While there are now several hands-on practical ethical hacking exams on the market (see our list
of the very best certi cations), OSCP offered by Offensive Security remains the most well-known
and sought-after. It’s infamous for its 24-hour long exam requiring the hacking of a three-machine
Active Directory network and three stand-alone boxes. It is as much a hazing ritual as an exam but
a must-have for aspiring pentesters.
Page 55 WWW.STATIONX.NET
How to Become a Penetration Tester
CompTIA Security+ Certi cation (SY0-601): The Total Course & Exam Simulations.
The Complete Certi ed Information Systems Auditor (CISA) Course & Exam Simulations
The Complete CISSP Bundle & Exam Simulations
Certi ed Ethical Hacker (CEH) training & Exam Simulations
Offensive Security Certi ed Professional (OSCP) training
CompTIA PenTest+ (PT0-002): The Total Course & Exam Simulations
Then you’ve analyzed your current hard and soft skills. Good work!
After looking at job postings, you lled in the skills and certi cations you will require for this
position and analyzed the gaps. Perfect!
Together, we covered the recommended courses to learn pentesting and how to get training for
the certi cations required. We even looked at some books for additional learning. Amazing!
Let’s start bringing it together and creating a personal roadmap for success.
Page 56 WWW.STATIONX.NET
How to Become a Penetration Tester
Page 57 WWW.STATIONX.NET
How to Become a Penetration Tester
We will discuss the last few steps in the coming sections, but you can start working on your
roadmap now. Also note that, as a StationX member, a mentor will produce a custom roadmap for
you.
Can a degree help? Sometimes. More so if you intend to become something like a Chief
Information Security Of cer (CISO).
Let’s look at it like this. The traditional attitude among companies for highly technical roles has
always been to require a degree.
The gap between the number of cyber security positions and the available candidates is widening,
and requiring a degree in computer science or a similar eld limits the potential candidates a
company can look at.
Next, while general computer science degrees are fairly common, speci c cyber security degrees
(let alone ones for pentesting) are more niche and harder to nd.
Comparing certi cations and degrees, it becomes clear why certi cations are requested more.
Certi cations are standardized. If you have a certi cation from a reputable organization, the
employer knows exactly what you know.
Page 58 WWW.STATIONX.NET
How to Become a Penetration Tester
It doesn’t matter where you write your OSCP, CISSP, or Security+ exam. You can write it in
any country and city worldwide, and it will be the same. The questions and tasks will vary
for each participant, of course, but the expectations and grading are equivalent to each
other no matter where you take them.
Degree programs vary from one college or university to another. The employer doesn’t know if the
courses are practical and hands-on or glori ed certi cation prep courses. Without being familiar
with each program and its syllabus, the employer is just guessing if you have the required skills.
Certi cations are much more de ned and regulated.
Having a bachelor's or master’s degree or higher will never hold you back, and yes, some
employers want to see it. A degree could tip the scales if all other things are equal between you
and another candidate.
Generally, though, your experience and certi cations will hold more weight than a degree.
Students often feel trapped in the cycle of “I can’t get a job without experience,” and “I can’t get
experience without a job.” Fortunately, there are several ways to bulk up the experience section of
your resume.
Page 59 WWW.STATIONX.NET
How to Become a Penetration Tester
Within your current job, seek out and request any security task, no matter how small
If you work in IT, networking, software engineering, or a similar role, count it as
experience
Do the StationX practical exercises and virtual labs
Become a teaching assistant at StationX
Join a StationX Mastermind Group
Networking with other security professionals through the StationX community
Answer questions within the StationX community
Write your own security tools, publish them and promote them in the StationX
community
Consider internships
Try volunteering
Go to cyber security clubs and meetups in your area or online
Leverage your degree or college course by doing a practical thesis
Try freelancing - consider bug bounty and sites like Upwork
Enter capture the ag (CTF) contests
Attend security conferences
Participate in security conferences and groups
Contribute to open-source projects
Get on GitHub and share any scripts you make
Network on social media
Work on your personal branding - get on social media, get yourself a blog, write articles
Page 60 WWW.STATIONX.NET
How to Become a Penetration Tester
If you’re considering a degree, choose one with a placement year in the industry
At university/college, professors often have paid work that you can apply for
CVEs (Common Vulnerabilities and Exposures) - discovering and disclosing security aws
Feeder Roles: Yes. Generally, these involve a low level of technical understanding. The A+,
Network+, or CCNA certi cations will go a long way here. The experience gained from the previous
section should be more than suf cient.
Entry Level: Generally, yes. That’s what an entry-level position is supposed to be, a job for those
just entering the eld without much experience. Certi cations and the experience from the
previous section will get you noticed here.
Intermediate and Advanced: No. For intermediate positions, you will have to earn your hours at an
entry-level position before being trusted with more responsibilities. Advanced levels require not
only technical experience but proven managerial skills.
Page 61 WWW.STATIONX.NET
How to Become a Penetration Tester
Let’s recap. You’ve planned out your roadmap to success. You’ve developed your hard and soft
skills. You’ve taken the courses, gotten the certi cations, and want to get hired. What now?
As hiring practices are changing to match the demand for skilled professionals, we all must adapt
in kind to properly promote ourselves.
A good product will save them time, lower their costs, and increase their revenue. Is that you? How
do they know that you are the product they need?
This is where a personal brand comes into play. You are advertising yourself the same way paid
software like Burp Suite Pro, Cobalt Strike, and PlexTrack advertise themselves. Show that you
offer skills, knowledge, passion, and determination that could be theirs if they hire you.
Get on social media, particularly Twitter and LinkedIn. Consider a separate professional Twitter
account from your regular one. Share your accomplishments. Thank in uencers who inspire you.
Complete a course? Tag the instructor. Pass a certi cation? Tag the organization and/or the
instructor of any prep course you took.
Get yourself a blog. Sharing your experiences is a great way to get noticed. It doesn’t matter if the
subject has been written on before by others because it’s never been written about by you. Write
opinions, walkthroughs, and exam experiences (without breaking con dentiality agreements),
journal your journey, and be sure to include struggles and victories.
Page 62 WWW.STATIONX.NET
How to Become a Penetration Tester
Become a teaching assistant at StationX. This is a great opportunity to help others stuck at the
same points you struggled with and eventually passed. It’s an amazing way to network, and saying
you acted as a teaching assistant or mentor will go a long way on a resume.
Review the “Demonstrate your Abilities and Passion” section of our free Career Guide.
We have an excellent Cyber Security Personal Branding course by Ken Underhill in our member
section.
Page 63 WWW.STATIONX.NET
How to Become a Penetration Tester
First, LinkedIn. Get a LinkedIn pro le if you haven’t already. If you’re building a professional
network, here is where you’re doing it. Many job application sites will auto ll their forms from your
LinkedIn pro le. Recruiters crawl LinkedIn all the time for potential talent.
You can learn how to make the most of your LinkedIn account with our “How to Use LinkedIn to
Find Jobs” course by Ken Underhill in the member section.
Second, have a traditional resume and cover letter template. Many companies still want an
uploaded .pdf or .docx resume. There is a chapter dedicated to resumes and cover letters in the
Complete Job Search Course.
Human Resources departments and hiring managers will often use a keyword search to select
what resumes to review, so be prepared to edit your resume and cover letter with each application
to use as many keywords from the job posting as possible.
Lastly, a personal website. This can be a free blog on Medium, a GitHub page, or a website with
your name or alias in the URL. You can download resume-style templates for WordPress and other
CMS’ to make things easier. Combining this with a regularly updated blog will receive the most
attention.
Page 64 WWW.STATIONX.NET
How to Become a Penetration Tester
Cyber Security Jobs is designed speci cally for our industry and organizes postings by
specialization and certi cations. We recommend you sign up here and register for
penetration tester job alerts in your area.
LinkedIn has a job search function. With a paid membership, it can provide information
about how your skills line up with the job posting and how you compare with other
applicants.
Indeed is a popular job posting site. You can upload a resume and allow recruiters to reach
out to you with potential job openings.
If you are in the US see the Cyber Security Supply & Demand Heat Map
Search for cyber security companies in your area and watch the job board on their website.
Some will allow you to sign up for email noti cations when a position is posted.
Be sure to take the Complete IT Job Search Course in the member’s section.
Read our Newbie’s Guide to Finding a Cyber Security Job article.
Once you score the interview, you need to prepare. There will, of course, be the usual tell us about
yourself, your previous experience, strengths and weaknesses, and other tried and true (and often
tired) questions. We have a course on preparing for these interviews.
More common now are behavioral interview questions. These are best discussed in the article “41
Behavioural Interview Questions You Must Know” by Akshay Sachdeva on The Martec. He
explains,
“The purpose of behavioral interview questions is to understand who you are, how you think, and
how you approach real-world dilemmas. Your answers to these behavioral questions can help the
interviewer gauge how you may (or may not) complement the current team.”
Page 65 WWW.STATIONX.NET
How to Become a Penetration Tester
1. Describe a time when you disagreed with a team member. How did you resolve
the problem?
2. Tell me about a time when you failed.
3. Give me an example of when you had to assume leadership for a team.
4. What is the most dif cult/challenging situation you’ve ever had to resolve in the
workplace?
5. Tell me about a time when you disagreed with a supervisor.
6. How do you approach problems? What’s your process?
We asked Joe Stimac from InterviewReady, “What piece of advice can you give early career Cyber
job seekers?”
“My best advice is to think like an employer and be prepared to demonstrate how you meet/exceed
the job requirements. Offer speci c examples of experiences for each duty/task posted in the job
requirements by using P.A.R. (describe the problem, the actions you took, and the result).
“Employers hire people whose answers are credible and memorable. If you have limited or no
employment history, talk about the transferable skills you learned at school or via StationX
training.”
For more advice on how to stand out from the competition in interviews, go to
www.InterviewReady.com, select a program, and use the Discount Code STATIONX at checkout
to get an instant 67% discount.
Page 66 WWW.STATIONX.NET
How to Become a Penetration Tester
Cyber security interviews will have some questions very speci c to the role. Here are some
examples you should prepare for.
Introduction Questions
Less Technical
Moderate Technical
Page 67 WWW.STATIONX.NET
How to Become a Penetration Tester
Highly Technical
Can SQL injection lead to remote code execution? How?
What is the rst thing you should do before testing begins?
You have local credentials to a machine but not network credentials. What do you do next?
On an Active Directory network, you have a valid username but no credentials. What would
you do next?
You get simple command injection on a web server through the address bar. What would
you do to get a shell?
To Sum Up
If you seek an exciting, challenging, nancially rewarding, and long-term secure career, penetration
tester is a superb choice. For all the convenience and prosperity modern technology has brought
us, the cyber landscape is still a battle eld. Companies and governments need ethical hackers to
help them remain secure. That isn’t changing anytime soon.
If you are the person they’re looking for, a world of opportunities to work and excel in this eld
awaits you. These roles can be provided from the headquarters of the world’s largest companies to
your home, from anywhere in the world. The only limits in this career are your own creativity and
resourcefulness.
Page 68 WWW.STATIONX.NET
How to Become a Penetration Tester
We hope this article helps you on your journey to becoming a penetration tester. If you have any
questions, let us know in the comment section below.
Pentesting is often done from home, so long as you have a consistent Internet connection and the
necessary hardware. All that said, many new to the eld may not have the immediate freedom of
working from home and instead will be asked to shadow someone more senior while being trained.
This will all depend on the particular policies your new employer has in place.
After all, you get to play the part of the bad guy, but legally and without the negative
consequences. Your job is breaking into a system like a spy or a techie in a heist movie. Of course,
it’s not all excitement.
Page 69 WWW.STATIONX.NET
How to Become a Penetration Tester
There is a lot of research and using open source intelligence. You are studying every public exploit
you intend to use to ensure you know what it is doing. There is a lot of documentation and
reporting to complete. But those who enjoy this job love it.
Trying to convince non-security management that an important issue needs xing can be dif cult,
especially if the solution requires money.
You may nd that your technical contact within the client organization is glad to be working with
you, but you may nd they are resentful that you are poking holes in their network, which can make
the job dif cult.
More senior positions carry more stress as you now deal with company politics unrelated to
pentesting.
For the most part, though, the job is more interesting than stressful.
There is a running joke on Infosec Twitter. Windows has what is called “Patch Tuesday,” where, on
the second Tuesday of every month, they release security patches for their systems. For cyber
security specialists, the following day is called “Exploit Wednesday,” where everyone works to
subvert the new patches. You can even nd T-shirts online with the slogan.
Page 70 WWW.STATIONX.NET
How to Become a Penetration Tester
The point we’re getting at is the threat landscape is constantly changing. Cybercriminals are always
developing new ways to break into systems. As a pentester, you will be required to keep up with
the new attack vectors, how to exploit them, and how to remediate them. This is not a stagnant
job, and you never stop learning.
If you have the mind for investigating and the patience to research, you can learn the technical skills
needed to take you the rest of the way.
If you have an I.T. background, you will be able to progress much faster than if you need to learn the
basics of networking and Linux systems.
Page 71 WWW.STATIONX.NET
How to Become a Penetration Tester
A StationX membership gives you access to a personal dedicated career mentor. Through a
detailed email consultation, they will create a customized study roadmap for you of what courses
and certi cates you should take and in what order, based on your current skills and career goals.
You would not do all the courses available in the member's section. You would only do those
suitable for your current skill level and the roles and domains you want to specialize in. You would
want to study a couple of hours a day.
Page 72 WWW.STATIONX.NET