Browse  ›  Information & cyber security  ›  Penetration Testing
Icon

Grow your Penetration Testing skills

Leverage the latest penetration testing tools and learn how to identify and mitigate vulnerabilities. Understand penetration testing methodology as you progress through our security and vulnerability testing courses tailored for network and application administrators.

Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Penetration Testing skills

Pluralsight's penetration testing training helps you understand how apps are attacked so you can learn how to defend them. Learn pentesting frameworks, pre-engagement, footprinting, and the most effective ways to identify a network's weaknesses and vulnerabilities.

Top Penetration Testing paths

Top Penetration Testing courses

Web Application Penetration Testing with Burp Suite
Course
Web Application Penetration Testing with Burp Suite
Dr. Sunny Wear
Intermediate
2h 27m
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
Course
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
Mike Woolard
Beginner
1h 55m
Technical Information Gathering with Maltego CE 4
Course
Technical Information Gathering with Maltego CE 4
Ricardo Reimao
Intermediate
25m
Pen Testing: Planning, Scoping, and Recon
Course
Pen Testing: Planning, Scoping, and Recon
Alexander Tushinsky
Intermediate
1h 13m
Planning and Scoping for CompTIA Pentest+
Course
Planning and Scoping for CompTIA Pentest+
Ricardo Reimao
Intermediate
1h 46m
Metasploit: Getting Started
Course
Metasploit: Getting Started
Keith Watson
Beginner
2h 5m
Leverage PowerShell Tools for Pen Testing
Course
Leverage PowerShell Tools for Pen Testing
Rishalin Pillay
Intermediate
1h 28m
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Course
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Christopher Rees
Beginner
5h 10m
PCI DSS: Detection, Assurance, and Management
Course
PCI DSS: Detection, Assurance, and Management
Jacob Ansari
Intermediate
3h 35m
Privilege Escalation with UACMe
Course
Privilege Escalation with UACMe
Malek Mohammad
Intermediate
9m
Credential Access with THC Hydra
Course
Credential Access with THC Hydra
Lee Allen
Intermediate
26m
Defense Evasion with ProxyChains
Course
Defense Evasion with ProxyChains
Ricardo Reimao
Intermediate
20m
Post Exploitation with Meterpreter
Course
Post Exploitation with Meterpreter
Ricardo Reimao
Intermediate
1h 41m
Web App Pen Testing: Reconnaissance
Course
Web App Pen Testing: Reconnaissance
Tim Tomes
Intermediate
1h 14m
Initial Access with sqlmap
Course
Initial Access with sqlmap
Casey Dunham
Intermediate
23m
Perform Attacks with Metasploit
Course
Perform Attacks with Metasploit
Kevin Cardwell
Intermediate
2h 9m
Investigate Network Targets with Nexpose
Course
Investigate Network Targets with Nexpose
Kevin Cardwell
Intermediate
1h 42m
Discover Network Weaknesses with Nessus
Course
Discover Network Weaknesses with Nessus
Kevin Cardwell
Intermediate
1h 45m
Collection with PowerUpSQL
Course
Collection with PowerUpSQL
Ricardo Reimao
Intermediate
26m
Vulnerability Analysis with Nessus
Course
Vulnerability Analysis with Nessus
Kevin Cardwell
Intermediate
1h 46m
Credential Access with John the Ripper
Course
Credential Access with John the Ripper
Rishalin Pillay
Intermediate
23m
Privilege Escalation with PEASS-NG
Course
Privilege Escalation with PEASS-NG
Rishalin Pillay
Intermediate
20m
Technical Information Gathering with theHarvester
Course
Technical Information Gathering with theHarvester
Ricardo Reimao
Intermediate
20m
Execution with macro_pack
Course
Execution with macro_pack
Ricardo Reimao
Intermediate
23m
Credential Access with Mimikatz 2
Course
Credential Access with Mimikatz 2
Lee Allen
Intermediate
25m
Discovery with Seatbelt
Course
Discovery with Seatbelt
Ricardo Reimao
Intermediate
20m
Privilege Escalation with Rubeus
Course
Privilege Escalation with Rubeus
Ricardo Reimao
Intermediate
20m
Custom Dashboards and Reports with IBM Security QRadar
Course
Custom Dashboards and Reports with IBM Security QRadar
Ricardo Reimao
Intermediate
55m
Lateral Movement with Mimikatz 2
Course
Lateral Movement with Mimikatz 2
Lee Allen
Intermediate
29m
IBM Security QRadar Functions and Capabilities
Course
IBM Security QRadar Functions and Capabilities
Ricardo Reimao
Intermediate
2h 38m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

What is Pluralsight?

Your career is defined by what you know and how well you know it.

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Plans & Pricing

Build skills that deliver results

Monthly Yearly
Save at least {{annual-percent-savings}}%!

Standard

$29.00
per month
$299.00
per year
Core course library,
paths and skill assessments.
  • 10 day free trial
  • Core library access
  • Skill and Role assessments
  • Learning paths and channels

Premium

$49.00
per month
$449.00
per year
Entire library of core and expanded courses, exams, projects and interactive courses.
  • Everything under Standard plus:
  • Expanded library access
  • Certification library access
  • Interactive courses and Projects

Future proof
your skills