Learn more about what it takes to get started in this offensive cybersecurity role.
Penetration testers, or pen testers for short, perform simulated cyberattacks on a company’s computer systems and networks. These authorized tests help identify security vulnerabilities and weaknesses before malicious hackers have the chance to exploit them.
A career as a pen tester often starts with an entry-level cybersecurity position. In this article, we’ll go into more detail about what penetration testers do, why this in-demand cybersecurity career could be a good fit for you, and how to get started. Afterward, if you're interested in developing your cybersecurity skills to become job-ready, consider enrolling in the Google Cybersecurity Professional Certificate. You can learn how to identify common risks and threats and techniques to mitigate them. Gain hands-on experience with Python, Linux, and structured query language (SQL).
As a penetration tester, you’ll take a proactive, offensive role in cybersecurity by performing attacks on a company’s existing digital systems. These tests might use a variety of hacking tools and techniques to find gaps that hackers could exploit. Throughout the process, you’ll document your actions in detail and create a report on what you did and how successful you were at breaching security protocols.
The day-to-day tasks of a pen tester will vary depending on the organization. Here are some common tasks and responsibilities you may encounter in this role, all pulled from real job listings:
Perform tests on applications, network devices, and cloud infrastructures
Design and conduct simulated social engineering attacks
Research and experiment with different types of attacks
Develop methodologies for penetration testing
Review code for security vulnerabilities
Reverse engineer malware or spam
Document security and compliance issues
Automate common testing techniques to improve efficiency
Write technical and executive reports
Communicate findings to both technical staff and executive leadership
Validate security improvements with additional testing
Penetration testers typically work in one of three environments:
In-house: As an in-house penetration tester, you work directly for a company or organization. This typically allows you to get to know the company’s security protocols well. You may also have more input into new security features and fixes.
Security firm: Some organizations hire an outside security firm to conduct penetration testing. Working for a security firm offers greater variety in the types of tests you’ll get to design and perform.
Freelance: Some penetration testers choose to work as freelancers. Choosing this path can give you greater flexibility in your schedule, but you may need to spend more time looking for clients early in your career.
The terms penetration testing and ethical hacking are sometimes used interchangeably in the cybersecurity world. But the two terms have slightly different meanings. Penetration testing focuses on locating security issues in specific information systems without causing any damage. Ethical hacking is a broader umbrella term that includes a wider range of hacking methods. You can think of penetration testing as one facet of ethical hacking. Both roles have overlap with a cybersecurity Red Team—the group that gives security feedback from the adversary's perspective.
As a penetration tester, you can earn a paycheck by legally hacking into security systems. It can be a fast-paced, exciting job if you have an interest in cybersecurity and problem-solving. In this section, we’ll take a closer look at the steps you might take to get your first job as a penetration tester.
Penetration testers need a solid understanding of information technology (IT) and security systems in order to test them for vulnerabilities. Skills you might find on a pen tester job description include:
Network and application security
Programming languages, especially for scripting (Python, BASH, Java, Ruby, Perl)
Threat modeling
Linux, Windows, and macOS environments
Security assessment tools
Pentest management platforms
Technical writing and documentation
Remote access technologies
Today’s penetration testers have a range of tools to help make their jobs faster and more efficient. If you’re interested in becoming a pen tester, it can help to gain familiarity with one or more of these tools.
•Kali Linux: Popular pentesting operating system
•Nmap: Port scanner for network discovery
•Wireshark: Packet sniffer to analyze traffic on your network
•John the Ripper: Open-source password cracker
•Burp Suite: Application security testing tools
•Nessus: Vulnerability assessment tool
•OWASP ZAP Proxy: Web application security scanner
Get hands-on experience with some of these tools in two hours or less with a Guided Project on Coursera. Start with Wireshark for Security: Detect Network Anomalies or Web Application Security Testing with OWASP ZAP.
Enrolling in a specialized course or training program is one of the best ways to start developing the skills you’ll need as a penetration tester. With these types of programs, you can learn in a more structured environment while building multiple skills at once.
If you’re new to cybersecurity, consider an option like the IBM Cybersecurity Analyst Professional Certificate, which includes an entire unit on penetration testing and incident response. The entire program is online and at your own pace, so you can learn job-ready skills while working or managing life’s other responsibilities.
While it can be helpful to have a degree in computer science, information technology, or cybersecurity, not all penetration testing jobs require a degree. Typically, your level of experience and ability to complete the task matter more than what degree (if any) you have. If you’re starting in cybersecurity without a related degree, it might be helpful to pursue a certification to validate your skills.
Cybersecurity certifications demonstrate to recruiters and hiring managers that you have the skills required to succeed in the industry. In addition to these more general cybersecurity certifications, you can also get certified in penetration testing or ethical hacking. Reputable certifications to consider include:
Certified Ethical Hacker (CEH)
GIAC Penetration Tester (GPEN)
GIAC Web Application Penetration Tester (GWAPT)
OffSec Certified Professional (OSCP & OSCP+)
Certified Penetration Tester (CPT)
Earning one of these certifications generally requires passing an exam. Besides earning a credential for your resume, preparing for a certification exam can often help you develop your skill set as well.
Many companies want to hire penetration testers with previous experience. Luckily, there are ways to start gaining experience outside of the workplace. Many pen testing training programs include hands-on testing in simulated environments.
Participating in bug bounty programs is another way to gain experience (and make your resume stand out). In these programs, companies typically offer cash bonuses to independent pen testers and security researchers who find and report security flaws or bugs in their code. It’s an excellent way to test your skills and start networking with other security professionals. You can find a list of bounties on sites like Bugcrowd and HackerOne.
Finally, you’ll find several websites designed to allow penetration testers to practice and experiment through fun, gamified experiences legally. Here are a few to get you started:
Many penetration testers start out in more entry-level IT and cybersecurity roles before advancing into pen testing. If you want to pursue a career in pen testing, consider starting out in a role like network or systems administrator or information security analyst to start building your IT skills.
When you’re ready to begin applying for pen tester jobs, be sure to extend your search beyond the usual job sites. While LinkedIn, Indeed, and ZipRecruiter are excellent resources, you should also scan specialized cybersecurity job boards, like Dice and CyberSecJobs.com.
A career as a pen tester gives you the opportunity to apply your hacking skills for the greater good by helping organizations protect themselves from cybercriminals. It’s also an in-demand, high-paying career path.
According to Glassdoor, the estimated total pay for penetration testers in the US is $150,376 annually. This figure includes an average base salary of $113,222 and $37,154 additional pay [1]. Additional pay may represent profit-sharing, commissions, or bonuses. Your salary will depend on a variety of factors, including your location, experience, education, and certifications. Some industries, like financial services and military contracting, tend to pay higher salaries than others.
The US Bureau of Labor Statistics (BLS) projects 33 percent job growth for information security analysts, including penetration testers, between 2023 and 2033 [2]. This is much faster than the average for all occupations in the US.
As you gain experience as a penetration tester, you may advance to lead a pen testing team. Some penetration testers go on to become information security managers and may even move into executive roles.
Ready to develop both technical and workplace skills for a career in cybersecurity? The Google Cybersecurity Professional Certificate is your gateway to exploring job titles like security analyst, security operations center (SOC) analyst, and more.
虽然没有两条职业道路是相同的,但在获得一到四年的 IT 和信息安全工作经验后,就有可能过渡到笔测试岗位。
从事渗透测试工作并不一定需要相关学位。获得计算机科学、网络安全或信息安全方面的学士或硕士学位会让您成为更有竞争力的候选人。
渗透测试需要计算机、Networking 和计算机安全方面的基础知识,以及许多技术技能。虽然一开始可能会让人望而生畏,但您可以通过练习和坚持不懈的努力学习这些技能,并熟练掌握相关技术。
随着越来越多的技术转移到云端,渗透测试人员的许多任务也随之转移。许多招聘网站都列出了远程渗透测试员的职位。
Glassdoor. "Penetration Tester Salaries, https://www.glassdoor.com/Salaries/penetration-tester-salary-SRCH_KO0,18.htm." Accessed June 5, 2025.
US Bureau of Labor Statistics. "Information Security Analysts, https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm." Accessed June 5, 2025.
Editorial Team
Coursera’s editorial team is comprised of highly experienced professional editors, writers, and fact...
此内容仅供参考。建议学生多做研究,确保所追求的课程和其他证书符合他们的个人、专业和财务目标。