If you're looking for a job as a penetration tester, these certs will help you demonstrate your hacking skills and your commitment to the field. Credit: Vertigo3D / Getty Images Penetration testing, sometimes called ethical hacking or red team hacking, is an exciting career path in which you simulate cyberattacks on target systems in order to test (and, ultimately, improve) their security. It’s a job that lots of people currently working in infosec would like to have, and one that can be tricky to get as competition heats up.“It used to be the best way to grow a career in attack and penetration was through hands-on experience,” says Matthew Eidelberg, technical manager for threat management at Optiv. “It’s becoming harder and harder to break into pen testing as a beginner, because these roles are no longer considered niche. They are in high demand. As a result, a lot of effort has gone into certifications based on training and real-world lab simulations for both students and professionals.”In fact, a range of ethical hacking certifications are now available from various companies and industry organizations—and earning these certs can boost your career prospects, says Ron Delfine, director of career services at Carnegie Mellon University’s Heinz College. “Depending on what skills an organization is seeking,” he says, “certification holders may have a competitive advantage related to career advancement, as they have already been through a proven process requiring them to display evidence of strong penetration testing skills through the certification and recertification process.”How can you pick the best penetration testing certification for you? We spoke to a number of pen testing pros to see how different certifications have helped their careers or helped them find good candidates when they were hiring. In general, most of the people we spoke to grouped certs offered by the same orgs together, so that’s how we’ll treat them here too. Top ethical hacking certificationsOffensive Security Certified Professional (OSCP)Offensive Security Wireless Professional (OSWP)Offensive Security Experienced Penetration Tester (OSEP)GIAC Penetration Tester (GPEN)GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)EC-Council Certified Ethical Hacker (CEH)EC-Council Certified Penetration Testing Professional (CPENT)/Licensed Penetration Tester (LPT Master)CompTIA PenTest+Offensive SecurityCertifications from Offensive Security received almost universal praise from the experts we talked to, who emphasized their rigorous and hands-on nature. The company’s most widely known cert is the Offensive Security Certified Professional (OSCP)—it’s “the standout cert in this area right now,” says Aaron Rosenmund, director of security research and curriculum at Pluralsight. But the company also offers Offensive Security Experienced Penetration Tester (OSEP), a more advanced certification, as well as Offensive Security Wireless Professional (OSWP), which as the name implies focuses on wireless networks.“People really value the OSCP,” says Connor McGarr, red team consultant at CrowdStrike, who credits the certification for helping him gain entry into the pen testing field despite his lack of experience. “Things are just put in a way that it forces you to think outside of the box. That creativity—’this is not working, now what’s my game plan’—that’s the mindset that is so valuable.” “These certifications stand out in the workplace,” says Optiv’s Eidelberg. “Professionals—namely, practice directors and hiring managers—know they’re backed by hands-on lab environments and live exams, as opposed to multiple-choice tests.” Those exams have a reputation as tough, but as Chris Elgee, senior penetration tester at Counter Hack Challenges, puts it, “the tenacity required to pass demonstrates a passion for the field. Professionals with an OSCP have shown the aptitude and grit required to grind through difficult offensive engagements.”Offensive Security Certified Professional (OSCP): Prerequisites: Candidates should come in with a solid understanding of TCP/IP networking, Windows and Linux administration experience, and basic bash and/or Python scripting. To be certified, you must take Offensive Security’s PEN-200 course, Penetration Testing With Kali Linux, and then pass its exam. Test format: An online practical lab course that you take over 24 hours. Cost: $999 pays for the course, the exam, and 30 days of lab access. More lab time, additional study content, and additional test retakes are available for a higher fee. Official website: https://www.offensive-security.com/pwk-oscp/Offensive Security Wireless Professional (OSWP): Prerequisites: Candidates should come in with a solid understanding of TCP/IP and the OSI model as well as familiarity with Linux, and will need a computer that can boot and run Kali Linux, along with other specific hardware. To be certified, you must take Offensive Security’s PEN-210 course, Wireless Attacks, and then pass its exam. Test format: A four-hour online practical lab course in which you break into a simulated wireless network. Cost: $1,999, which includes the course, a year’s worth of lab access and two exam attempts; other more expansive packages are available for a higher price. Official website: https://www.offensive-security.com/wifu-oswp/Offensive Security Experienced Penetration Tester (OSEP): Prerequisites: Candidates should have a solid ability to enumerate targets to identify vulnerabilities; be able to identify and exploit vulnerabilities like SQL injection, file inclusion, and local privilege escalation; and have an understanding of Active Directory and knowledge of basic AD attacks. To be certified, you must take Offensive Security’s PEN-300 course, Evasion Techniques and Breaching Defenses, and then pass its exam. Test format: An online practical lab course that you take over 48 hours. Cost: $1,299 pays for the course, the exam, and 60 days of lab access. More lab time, additional study content, and additional test retakes are available for a higher fee. Official website: https://www.offensive-security.com/pen300-osep/GIACGIAC (Global Information Assurance Certification) is an organization created by the SANS Institute specifically to administer certifications tied to SANS courses, though you can take the exams to earn the certs without taking a SANS training. GIAC offers two pen testing certifications: GIAC Penetration Tester (GPEN) and the more advanced GIAC Exploit Researcher and Advanced Penetration Tester (GXPN). These also received high praise from the pros we talked to from a job-hunting and hiring perspective alike.“I have found that my GIAC certs help open the door to get the interview and past HR gatekeepers,” says Xena Olsen, a senior cyber threat hunter at a Fortune 500 company. Even though she works on the “blue team” threat hunting side of things, she says that “the GXPN was an amazing growth experience—and helps me stand out from the other blue applicants.” Jason Nickola, chief operating officer and senior security consultant at Pulsar Security, praises the broad range of knowledge that goes into the GPEN certification: “As a hiring manager, GPEN means contributing to pen test engagements on day 1.” He calls the GXPN “a real beast of a certification. Everything here is advanced and shows that cert holders have much more than just the basic skills to be a penetration tester, but are instead able to push the envelope with custom, bespoke exploits of their own design.”While Quentin Rhoads-Herrera, director of professional services at CyberOne, praised the training material that backs up the GIAC certs, he notes that “SANS is still heavily reliant on open book multiple choice,” which is a strike against it in his mind. “Since our work is very creative and hands-on,” he says, “it is imperative that a certification exam proves that the student can leverage the hacker’s mindset to work through complex problems.”GIAC Penetration Tester (GPEN): Prerequisites: Candidates should have a firm understanding of Windows and Linux OSes and command-line tools, computer networking and TCP/IP protocols, and a basic understanding of cryptography. Test format: Three-hour web-based proctored exam with 82 questions; you must answer 75% correctly in order to pass. Cost: You can “challenge” the GPEN exam—that is, take the test without any accompanying paid training—for $2,499. GPEN training courses like the one from the SANS Institute—generally include a voucher to take the exam, and can cost $7,000 or more. Official website: https://www.giac.org/certifications/penetration-tester-gpen/GIAC Exploit Researcher and Advanced Penetration Tester (GXPN): Prerequisites: Candidates should already be familiar with fundamentals of pen testing experience, programming (preferably in Python and C/C++) and networking before even beginning to prepare for this certification. Test format: Three-hour web-based proctored exam with 60 questions; you must answer 67% correctly in order to pass. The “CyberLive” testing takes place in a lab environment where test takers prove their skills using live code on virtual machines. Cost: You can “challenge” the GXPN exam—that is, take the test without any accompanying paid training—for $2,499. XPN training courses like the one from the SANS Institute—generally include a voucher to take the exam, and can cost $7,000 or more. Official website: https://www.giac.org/certifications/exploit-researcher-advanced-penetration-tester-gxpn/EC-CouncilThe EC-Council is a cybersecurity education and training nonprofit founded in the wake of the 9/11 attacks, and Certified Ethical Hacker (CEH) is perhaps their highest-profile cert—in fact, it’s one of the best-known certifications in the field. The EC-Council recently launched a twinned pair of certs, Certified Penetration Testing Professional (CPENT) and Licensed Penetration Tester (LPT Master), that are based on the same training material and exam, with the LPT Master going to those who score best on the test.CEH is relatively well known, and the security pros we spoke to note that it has its place in the field, but they were less enthusiastic about it than they were about certs from GIAC or Offensive Security. “I would note CEH as a ‘foot-in-the-door’ certification for a pen testing internship or in preparation for additional study,” says Melissa Miller, managing security consultant at NetSPI. Critical Start’s Rhoads-Herrera calls it “valuable as a good way to get past HR screeners” but adds that “the course work is not up to par with other certifications.”“CEH does qualify you for a number of contracts by virtue of being one of the oldest in the game,” says Pluralsight’s Rosenmund, “but doesn’t necessarily ensure from an employer perspective that you are ready to do the job.” Counter Hack Challenges’ Elgee gives a specific example: “CEH is most valuable for checking specific certification boxes, especially in US government,” but says it “otherwise has a low value to price ratio.”Certified Ethical Hacker (CEH): Prerequisites: You must either take an EC-Council-approved CEH training course or establish that you have at least two years of professional infosec experience before you can take the exam. Test format: Four hours, 125 multiple choice questions. If you pass this exam, you can also take the Certified Ethical Hacker Practical exam—six hours, 20 practical challenges—in order to earn CEH Master certification. Cost: The exam costs $1,199 plus $100 for remote proctoring; there is a $100 nonrefundable application fee, and official training courses can cost anywhere from $850 to $2,999. Official website: https://www.eccouncil.org/programs/certified-ethical-hacker-ceh/Certified Penetration Testing Professional (CPENT)/Licensed Penetration Tester (LPT Master): Prerequisites: Candidates must have already received CEH and Certified Security Analyst certs from the EC-Council, and submit an application that includes a criminal background check. The exam is meant to follow on from the EC-Council’s CPENT training course, although experienced pen testers can request to “challenge” the exam based on their existing skills. Test format: A 24-hour online practical exam in which you deploy advanced pen-testing techniques. A 90% score or above earns you the LPT certification, while 70-90% scores you a CPENT. Cost: The CPENT course is $2,199, which includes the exam and access to the EC-Council’s practice range and other content. There is also a $500 application fee (which covers the background check.) Official website: https://www.eccouncil.org/programs/licensed-penetration-tester-lpt-master/CompTIA The final certification org we’ll discuss is CompTIA, a nonprofit best known for its “plus” series of mostly early-career certs. CompTIA rolled out a penetration testing certification, PenTest+, in 2018, and the experts we spoke to were generally positive about it. Ben Sadeghipour, Hacker and Manager of Hacker Education at HackerOne, calls PenTest+ one of the “most helpful” certifications in the field. “This certification teaches you about the legality and compliance aspect of a pen test, how to plan and scope out penetration testing, how to perform vulnerability scanning and testing, and how to write and communicate your findings with the customer’s management team,” he says.“CompTIA recently revised its CompTIA PenTest+ certification exam to account for the rapid emergence of new cloud-connected services and applications that are constantly introducing new threat vectors,” adds Cynthia Overby, co-founder and president at Key Resources Inc. “Compliance and pen testing are becoming more challenging in this cloud-connected environment, so CompTIA’s update is an important one.”PenTest+ Prerequisites: No specific prereqs, but candidates should have a minimum of 3-4 years of infosec experience. Intended as a follow-on to CompTIA’s Security+ cert. Test format: Two hours and 45 minutes, a maximum of 85 multiple choice and performance-based questions Cost: $370 Official website: https://www.comptia.org/certifications/pentestCertifications are just the beginningWhile everyone we spoke to saw at least some value in certifications, several emphasized that they’re not the only thing hiring managers consider when looking at a candidate—and often aren’t the most important.“The rate of change in this space is rapid—what was useful yesterday is constantly changing,” says Pluralsight’s Rosenmund. “A lot of these certifications share an informational base and repeat a lot of the same information that isn’t necessarily what is ‘fresh and hot.’ Certifications in security are good for proof of knowledge in understanding concepts, but won’t keep you fresh for your job.”Moshe Levi, hacking team leader at Cyberint, sees certs as important for those just entering the field. “You almost can’t join a company without experience, which seems ridiculous—because how can you gain experience without an actual job? That’s why a certificate can play a significant part in a job interview when the candidate has no experience in real life.” However, he adds that “after that breakthrough into the field, the certifications matter less and less, and experience takes over. If I am hiring for my team, experience always wins out over certifications, but the latter can get them in the door—and depending on the pool of potential employees, can land them a job as well.”And even if you lack conventional on-the-job experience, a certification isn’t the only way to show your stuff. “Folks who are considering using certifications on their resume should definitely remember to include their own unguided research as well,” says Casey Ellis, founder and CTO at Bugcrowd. “A well-stocked GitHub page showing contributions to security tools and projects, a blog talking through security research, their bug bounty or vulnerability disclosure Hall of Fame listings—these are all practical ways to demonstrate and communicate real-world skill to a hiring manager quickly.” Related content news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security feature What should be in a company-wide policy on low-code/no-code development Low-code/no-code development could bridge the gulf of development backlogs that exists between great ideas and great execution of digital innovation. But not without security policies around areas like access control, code quality, and application vi By Ericka Chickowski Dec 06, 2023 15 mins Application Security Security Practices news analysis Cisco unveils AI-powered assistants to level up security defenses New AI-driven tools aim to simplify and bolster policies, alerts and prevention to reduce complexity when setting security policies and assess traffic without decryption. By Rosalyn Page Dec 05, 2023 5 mins Encryption Cloud Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe