Certification Roadmap
This appendix provides a comprehensive guide to professional certifications in ethical hacking and cybersecurity. It covers entry-level through advanced certifications, mapping each to career roles, this textbook's chapters, and a recommended progression path.
Pricing and exam details are current as of publication. Verify with the certification vendor before enrolling, as these change frequently.
Visual Progression Diagram
CERTIFICATION PROGRESSION MAP
================================================================
YEAR 0-1 YEAR 1-3 YEAR 3-5+
(Foundations) (Core Offensive) (Advanced/Specialist)
================================================================
+-----------+
| CompTIA |
| Security+ |----+
+-----------+ |
| |
v | +--------+ +--------+
+-----------+ +---->| OSCP |-------->| OSEP |
| eJPT |---------+| PEN-200| | PEN-300|
+-----------+ | +--------+ +--------+
| | |
| v v
+-----------+ | +--------+ +--------+
| CEH |----+ | PNPT | | OSED |
+-----------+ | +--------+ | EXP-301|
| | +--------+
| v |
+-----------+ | +--------+ v
| CompTIA |----+ | GPEN | +--------+
| PenTest+ | | +--------+ | OSWE |
+-----------+ | | | WEB-300|
| v +--------+
| +--------+
+---->| GWAPT |
| +--------+
| |
| v +--------+
| +--------+ | GXPN |
+---->| CREST |--------->| SEC660 |
| CRT | +--------+
+--------+ |
| v
v +--------+
+--------+ | CREST |
| CREST | | CCT |
| CRT | +--------+
+--------+
================================================================
SPECIALIZED TRACKS (can pursue at any point after core certs)
================================================================
Cloud Security: AWS Security Specialty --> CCSP --> CISSP
Incident Response: GCIH --> GCFA --> GNFA
Web Application: GWAPT --> OSWE --> BSCP (Burp Suite)
Mobile Security: eMAPT --> GMOB
Management: CISSP --> CISM --> CRISC
Compliance: CISA --> ISO 27001 Lead Auditor
================================================================
LEGEND: ----> = Recommended progression
Each cert is independent (no hard prerequisites)
but the progression order optimizes learning
================================================================
Entry-Level Certifications
CompTIA Security+ (SY0-701)
| Attribute | Details |
|---|---|
| Vendor | CompTIA |
| Cost | ~$404 (exam only); study materials additional |
| Exam Format | Up to 90 questions (multiple choice + performance-based), 90 minutes |
| Passing Score | 750/900 |
| Prerequisites | None (2+ years IT experience recommended) |
| Difficulty | 3/10 |
| Study Time | 6-12 weeks (with IT background); 3-4 months (without) |
| Renewal | Every 3 years (50 CEUs or retake exam) |
| Textbook Chapters | 1-6 (Foundations), 40 (Compliance), 41 (Career Paths) |
What It Covers: Security concepts, threats/vulnerabilities/mitigations, security architecture, security operations, security program management. Broad but shallow coverage of the entire security domain.
Career Value: The most widely recognized entry-level security certification. Required for many U.S. Department of Defense positions (DoD 8570 IAT Level II). A solid first certification if you need HR-recognized credentials quickly. However, it does not teach hands-on offensive skills — it is a knowledge-based exam that validates understanding of security concepts.
Recommended Study Resources: - Professor Messer's free Security+ video course (YouTube) - CompTIA CertMaster Practice (official practice exams) - Jason Dion's Security+ course on Udemy - The official CompTIA Security+ Study Guide (Sybex)
Who Should Get This: Anyone entering cybersecurity from a non-security background. IT professionals who need a security certification for compliance or job requirements. Students who want a foundational credential before pursuing offensive certifications.
eLearnSecurity Junior Penetration Tester (eJPT v2)
| Attribute | Details |
|---|---|
| Vendor | INE Security (formerly eLearnSecurity) |
| Cost | ~$249 (exam voucher); training subscription ~$49/month |
| Exam Format | Practical exam: 48 hours, 35 questions based on live lab environment |
| Passing Score | 70% (approximately 25/35 correct) |
| Prerequisites | None |
| Difficulty | 4/10 |
| Study Time | 4-8 weeks (with some IT background); 2-3 months (without) |
| Renewal | Every 3 years |
| Textbook Chapters | 1-6 (Foundations), 7-11 (Reconnaissance/Scanning), 12 (Metasploit basics), 15-16 (Basic PrivEsc) |
What It Covers: Networking fundamentals, information gathering, scanning and enumeration, vulnerability assessment, web application testing basics, host-based attacks, and basic exploitation using Metasploit.
Career Value: The best first practical certification. The exam tests real hands-on skills in a live environment — you actually scan networks, exploit vulnerabilities, and answer questions based on what you find. At $249, it is the most cost-effective way to prove practical offensive skills. Increasingly recognized by employers, though not as widely known as OSCP or CEH.
Recommended Study Resources: - INE's PTS (Penetration Testing Student) course (included with subscription) - TryHackMe "Jr Penetration Tester" path - TCM Security's "Practical Ethical Hacking" course - Practice on HackTheBox Starting Point
Who Should Get This: Complete beginners who want their first practical certification. Anyone preparing for OSCP who wants a confidence-building milestone. Budget-conscious learners who cannot afford OSCP immediately.
Certified Ethical Hacker (CEH v13)
| Attribute | Details |
|---|---|
| Vendor | EC-Council |
| Cost | ~$1,199 (exam only); ~$2,199-$3,499 (with training) |
| Exam Format | 125 multiple-choice questions, 4 hours. Optional CEH Practical: 6-hour hands-on exam |
| Passing Score | 60-85% (varies by exam form) |
| Prerequisites | 2 years infosec experience OR official EC-Council training |
| Difficulty | 4/10 (knowledge exam); 6/10 (practical) |
| Study Time | 8-12 weeks |
| Renewal | Every 3 years (120 ECE credits) |
| Textbook Chapters | Broad coverage across all parts; strongest alignment with 1-6, 10-11 |
What It Covers: Information security overview, reconnaissance, scanning, enumeration, vulnerability analysis, system hacking, malware, sniffing, social engineering, DoS, session hijacking, web server/application attacks, SQL injection, wireless, cryptography, cloud computing, and IoT.
Career Value: The most recognized ethical hacking certification by name, particularly in government, military, and large enterprise HR departments. Approved for DoD 8570 at multiple levels. However, the knowledge-based exam is criticized by practitioners for testing memorization over skill. The CEH Practical exam (separate purchase) adds hands-on credibility. If your target employer requires CEH specifically (check job postings), get it. Otherwise, OSCP or PNPT provides more industry respect per dollar spent.
Recommended Study Resources: - Official CEH courseware (included with training package) - Matt Walker's "CEH Certified Ethical Hacker All-in-One Exam Guide" - Boson CEH Practice Exams
Who Should Get This: Professionals whose employer or target role specifically requires CEH. Government/military personnel who need it for DoD 8570 compliance. Those who want name recognition on their resume for HR screening.
Intermediate Certifications
Offensive Security Certified Professional (OSCP / PEN-200)
| Attribute | Details |
|---|---|
| Vendor | Offensive Security (OffSec) |
| Cost | ~$1,749 (90 days lab + 1 exam attempt); ~$2,749 (1 year Learn One subscription) |
| Exam Format | 24-hour practical exam: compromise machines + write a professional report |
| Passing Score | 70 points out of 100 |
| Prerequisites | None officially; strong Linux, networking, and scripting skills are essential |
| Difficulty | 7/10 |
| Study Time | 3-6 months of daily practice (after completing PEN-200 course material) |
| Renewal | No expiration (lifetime certification) |
| Textbook Chapters | 3 (Lab Setup), 6 (Networking), 7-11 (Recon/Scanning), 12-17 (Exploitation), 18-22 (Web Attacks), 39 (Report Writing) |
What It Covers: The PEN-200 course covers: information gathering, vulnerability scanning, web application attacks, buffer overflows (Windows), client-side attacks, file transfers, antivirus evasion, privilege escalation (Linux and Windows), password attacks, pivoting and tunneling, Active Directory attacks, and Metasploit framework.
Career Value: The gold standard for penetration testing certifications. Universally respected by technical hiring managers and security teams. The "Try Harder" methodology teaches self-reliance and persistence. The 24-hour exam is grueling but proves that you can actually exploit systems under pressure and write a professional report. Many pentest job postings list OSCP as required or strongly preferred. OSCP alone has opened doors to mid-level and even senior penetration testing positions.
Recommended Study Resources: - Complete all PEN-200 course exercises and lab machines - TJ Null's OSCP-like HackTheBox machine list - Offensive Security Proving Grounds (Practice and Play) - IppSec's HackTheBox walkthrough videos (for methodology) - TryHackMe's "Offensive Pentesting" path - TCM Security's "Windows Privilege Escalation" and "Linux Privilege Escalation" courses
Exam Strategy: 1. Enumerate everything thoroughly before attempting exploitation 2. Take detailed notes and screenshots as you go — you need them for the report 3. Manage your time — do not spend more than 2 hours on a single machine before moving on 4. The Active Directory set is worth 40 points and is a complete attack chain — prioritize this 5. Write your report as you go, not at the end when you are exhausted 6. Sleep if you need to — the exam is 24 hours but the report window extends to ~24 additional hours
Who Should Get This: Anyone serious about a penetration testing career. This is the certification that most clearly separates "learning about security" from "doing security." Target this after 6+ months of consistent hands-on practice.
Practical Network Penetration Tester (PNPT)
| Attribute | Details |
|---|---|
| Vendor | TCM Security |
| Cost | ~$399 (exam only); ~$30/month or ~$299/year (all courses included) |
| Exam Format | 5-day practical exam: full external-to-internal pentest + professional report |
| Passing Score | Successful compromise of objectives + acceptable report |
| Prerequisites | None |
| Difficulty | 6/10 |
| Study Time | 2-4 months |
| Renewal | No expiration |
| Textbook Chapters | 7-9 (OSINT/Recon), 10-11 (Scanning), 12 (Exploitation), 14 (Password Attacks), 17 (Active Directory), 39 (Report Writing) |
What It Covers: OSINT and external reconnaissance, network pentesting methodology, Active Directory exploitation (full kill chain), report writing. The exam simulates a real-world engagement: start from an external perspective, use OSINT to identify targets, breach the external perimeter, escalate internally, compromise Active Directory, and write a professional report.
Career Value: Rapidly growing in reputation. Tests the complete penetration testing lifecycle including OSINT and report writing — areas that OSCP historically did not emphasize. The 5-day timeframe is more realistic than OSCP's 24-hour crunch. The report is reviewed by a human grader and must meet professional standards. Excellent value at $399 (roughly 1/4 the cost of OSCP). Many hiring managers now accept PNPT alongside or instead of OSCP.
Recommended Study Resources: - TCM Security's Practical Ethical Hacking course - TCM Security's Open-Source Intelligence (OSINT) Fundamentals - TCM Security's Windows Privilege Escalation for Beginners - TCM Security's Active Directory Hacking course - Practice Active Directory attacks in a lab environment
Who Should Get This: Budget-conscious aspiring pentesters. Anyone who wants a practical certification before investing in OSCP. Those who want to validate Active Directory attack skills specifically.
GIAC Penetration Tester (GPEN)
| Attribute | Details |
|---|---|
| Vendor | GIAC (Global Information Assurance Certification) / SANS Institute |
| Cost | ~$979 (exam only); ~$8,525 (SANS SEC560 course + exam) |
| Exam Format | 82 questions (multiple choice + CyberLive hands-on), 3 hours. Open book (you can bring printed materials) |
| Passing Score | 74% |
| Prerequisites | None (SEC560 course recommended) |
| Difficulty | 6/10 |
| Study Time | 2-4 months (with course); 4-6 months (self-study) |
| Renewal | Every 4 years (36 CPE credits) |
| Textbook Chapters | 7-11 (Recon/Scanning), 12-17 (Exploitation), 24 (Post-Exploitation), 38 (Methodology) |
What It Covers: Penetration testing planning, scoping, and reconnaissance. Scanning and exploitation. Password attacks. Metasploit and other exploitation tools. Post-exploitation, pivoting, and lateral movement. Comprehensive penetration testing methodology.
Career Value: Highly respected, especially in large enterprises, government, and consulting firms. SANS training is considered among the best in the industry, and the GPEN validates that knowledge. The "open book" format means the exam tests understanding and application rather than memorization — but you need a well-organized index to use your materials effectively. Expensive if paying out of pocket, but many employers sponsor SANS training and GIAC certifications.
Recommended Study Resources: - SANS SEC560: Network Penetration Testing and Ethical Hacking (the gold standard course) - Build a detailed, indexed study guide from the course materials - Practice labs from SANS (included with course) - GIAC practice exams (included with exam registration)
Who Should Get This: Mid-career professionals whose employer will pay for SANS training. Government and defense sector professionals. Those who prefer a rigorous course + exam format over self-study + practical exam.
GIAC Web Application Penetration Tester (GWAPT)
| Attribute | Details |
|---|---|
| Vendor | GIAC / SANS |
| Cost | ~$979 (exam only); ~$8,525 (SANS SEC542 course + exam) |
| Exam Format | 75 questions (with CyberLive), 2 hours |
| Passing Score | 71% |
| Prerequisites | None (SEC542 recommended) |
| Difficulty | 6/10 |
| Study Time | 2-4 months |
| Renewal | Every 4 years (36 CPE credits) |
| Textbook Chapters | 18-23 (Web Application Exploitation) |
What It Covers: Web application penetration testing methodology, injection attacks, XSS, authentication attacks, session management, AJAX and web services testing, configuration testing, and web application reconnaissance.
Career Value: The premier web application penetration testing certification. Complements GPEN well — GPEN covers network/infrastructure, GWAPT covers web applications. Together they validate comprehensive penetration testing capability. Valued in consulting firms and organizations with significant web application portfolios.
Who Should Get This: Penetration testers specializing in web applications. Those who already have GPEN or OSCP and want to deepen web skills. Application security professionals.
CompTIA PenTest+ (PT0-002)
| Attribute | Details |
|---|---|
| Vendor | CompTIA |
| Cost | ~$404 exam fee |
| Exam Format | 85 questions (multiple choice + performance-based), 165 minutes |
| Passing Score | 750/900 |
| Prerequisites | Security+ or equivalent; 3-4 years hands-on experience recommended |
| Difficulty | 4/10 |
| Study Time | 6-10 weeks |
| Renewal | Every 3 years (60 CEUs) |
| Textbook Chapters | 7-11 (Recon/Scanning), 12 (Exploitation basics), 38-39 (Methodology/Reporting) |
What It Covers: Planning and scoping, information gathering and vulnerability identification, attacks and exploits, penetration testing tools, reporting and communication.
Career Value: Acceptable entry-level pentest certification, especially for government positions (DoD 8570). Less respected than OSCP or PNPT by technical hiring managers because it is knowledge-based rather than practical. Good as a stepping stone if you already have Security+ and want to show interest in offensive security before pursuing OSCP.
Who Should Get This: Government/military personnel who need it for compliance. Those building a CompTIA certification stack. Those who want an intermediate step between Security+ and OSCP.
Advanced Certifications
Offensive Security Experienced Penetration Tester (OSEP / PEN-300)
| Attribute | Details |
|---|---|
| Vendor | Offensive Security |
| Cost | ~$1,749+ (included in Learn One subscription at ~$2,749/year) |
| Exam Format | 48-hour practical exam |
| Passing Score | Achievement of exam objectives + report |
| Prerequisites | OSCP recommended (not required) |
| Difficulty | 8/10 |
| Study Time | 3-6 months after OSCP |
| Renewal | No expiration |
| Textbook Chapters | 17 (Active Directory), 24 (Post-Exploitation), 27 (Evasion), 35 (Red Team Operations) |
What It Covers: Advanced exploitation techniques, client-side attacks, process injection, antivirus and application whitelisting evasion, advanced Active Directory exploitation (delegation attacks, ADCS, trusts), custom C# tooling, kiosk breakouts, and Linux exploitation in enterprise environments.
Career Value: Demonstrates ability to bypass modern defenses and conduct sophisticated attacks. Valued for senior penetration testing and red team positions. The 48-hour exam tests endurance and advanced problem-solving. Together with OSCP, OSEP forms a powerful credential combination.
Who Should Get This: Experienced pentesters (2+ years post-OSCP) who want to advance to red team roles. Those who regularly encounter environments with EDR and want to learn evasion techniques.
Offensive Security Exploit Developer (OSED / EXP-301)
| Attribute | Details |
|---|---|
| Vendor | Offensive Security |
| Cost | ~$1,749+ |
| Exam Format | 48-hour practical exam |
| Passing Score | Achievement of objectives + report |
| Prerequisites | Strong assembly language and debugging skills |
| Difficulty | 9/10 |
| Study Time | 4-6 months |
| Renewal | No expiration |
| Textbook Chapters | 27 (Evasion — foundational concepts), 28 (Cryptography for context) |
What It Covers: Windows exploit development: stack-based buffer overflows, SEH exploitation, reverse engineering with WinDbg, ROP chain construction, format string attacks, custom shellcode development.
Career Value: Niche but highly valued for exploit development and vulnerability research roles. Not needed for standard penetration testing — this is for those pursuing specialized exploit development careers. Combined with OSCP and OSEP, earns the OSCE3 designation.
Who Should Get This: Aspiring exploit developers and vulnerability researchers. Those interested in writing 0-day exploits. Security professionals who want to understand exploitation at the deepest level.
Offensive Security Web Expert (OSWE / WEB-300)
| Attribute | Details |
|---|---|
| Vendor | Offensive Security |
| Cost | ~$1,749+ |
| Exam Format | 48-hour practical exam |
| Passing Score | Achievement of objectives + report |
| Prerequisites | OSCP recommended; strong web development knowledge required |
| Difficulty | 8/10 |
| Study Time | 3-6 months |
| Renewal | No expiration |
| Textbook Chapters | 18-23 (Web Application Exploitation — all chapters; goes far deeper) |
What It Covers: White-box web application security testing through source code review. Languages covered include Java, C#, PHP, JavaScript/Node.js. Topics: authentication bypass through source code analysis, insecure deserialization exploitation, type juggling, SQL injection via code review, server-side template injection, and writing custom exploits for web vulnerabilities.
Career Value: The top certification for web application security. Validates ability to find vulnerabilities through source code review, not just black-box testing. Highly valued for application security roles, security consulting firms, and bug bounty hunting. Combined with OSCP and OSED, earns the OSCE3 designation.
Who Should Get This: Web application security specialists. Bug bounty hunters who want to move beyond black-box testing. Application security consultants.
GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)
| Attribute | Details |
|---|---|
| Vendor | GIAC / SANS |
| Cost | ~$979 (exam); ~$8,525 (SANS SEC660 + exam) |
| Exam Format | 60 questions (with CyberLive), 3 hours |
| Passing Score | 67% |
| Prerequisites | GPEN or equivalent experience recommended |
| Difficulty | 8/10 |
| Study Time | 3-6 months |
| Renewal | Every 4 years |
| Textbook Chapters | 12-17 (Exploitation), 27 (Evasion), 28 (Cryptography) |
What It Covers: Advanced network attacks, cryptographic attacks, network device exploitation, Python for penetration testers, advanced fuzzing and exploit development, bypassing security controls, exploitation of modern mitigations (ASLR, DEP, stack canaries).
Career Value: One of the most respected advanced certifications. SANS SEC660 is considered one of the most technically demanding SANS courses. Validates deep technical expertise in exploitation and advanced attack techniques.
Who Should Get This: Senior penetration testers pursuing the most challenging GIAC certification. Those who have completed GPEN and want the next level.
CREST Registered Penetration Tester (CRT) and Certified Tester (CCT)
| Attribute | CRT | CCT |
|---|---|---|
| Vendor | CREST International | CREST International |
| Cost | ~$500-$1,500 (varies by country) | ~$1,000-$2,500 |
| Exam Format | Practical exam (infrastructure or application) | Advanced practical exam |
| Passing Score | Pass/Fail | Pass/Fail |
| Prerequisites | CREST Practitioner Security Analyst (CPSA) | CRT + significant experience |
| Difficulty | 6/10 (CRT), 8/10 (CCT) | See above |
| Study Time | 3-6 months (CRT), 6-12 months (CCT) | See above |
| Renewal | Every 3 years | Every 3 years |
| Textbook Chapters | 7-23 (CRT), Full curriculum (CCT) | See above |
What It Covers: CRT tests practical penetration testing skills against realistic targets. CCT is the advanced tier, testing expert-level skills in either infrastructure or application testing.
Career Value: Essential in the UK, Australia, Singapore, and other countries where CREST is the standard for regulated penetration testing. UK financial services (FCA-regulated) and government entities require CREST-certified testers. CHECK (NCSC) and STAR (CREST) team leaders must hold CCT. If you plan to work in the UK or APAC security consulting market, CREST certification is often mandatory.
Who Should Get This: Penetration testers working in the UK, Australia, Singapore, or other CREST-aligned markets. Those targeting government or financial services clients in these regions.
Specialized Certifications
Cloud Security
AWS Certified Security — Specialty - Focus: AWS-specific security services, incident response, data protection, infrastructure security - Cost: ~$300 - Difficulty: 6/10 - Textbook chapters: 29 (Cloud Security Testing) - Best for: Penetration testers specializing in AWS environments
Certified Cloud Security Professional (CCSP) - Focus: Cloud architecture, design, operations, and compliance (vendor-neutral) - Cost: ~$599 - Difficulty: 6/10 - Textbook chapters: 29, 40 (Compliance) - Best for: Broad cloud security knowledge; complements cloud pentesting skills
Incident Response and Forensics
GIAC Certified Incident Handler (GCIH) - Focus: Incident handling methodology, common attack techniques from a defender's perspective - Cost: ~$979 (exam); ~$8,525 (with SANS SEC504) - Difficulty: 5/10 - Textbook chapters: 37 (Incident Response), 2 (Threat Landscape) - Best for: Those bridging offensive and defensive roles; SOC analysts pursuing pentesting
GIAC Certified Forensic Analyst (GCFA) - Focus: Digital forensics, memory analysis, timeline analysis, advanced incident response - Cost: ~$979 (exam); ~$8,525 (with SANS FOR508) - Difficulty: 7/10 - Textbook chapters: 37 (Incident Response and Forensics) - Best for: Forensics specialists and incident response leads
Management and Governance
Certified Information Systems Security Professional (CISSP) - Focus: Security management across 8 domains (broad, management-oriented) - Cost: ~$749 - Difficulty: 6/10 - Textbook chapters: 40 (Compliance/Governance), 41 (Career Paths) - Best for: Senior security professionals moving into management or architecture roles. Not a penetration testing certification, but valued for career advancement.
Certification-to-Chapter Mapping
This table maps each certification to the chapters of this textbook that best prepare you for its content.
| Certification | Primary Chapter Coverage |
|---|---|
| CompTIA Security+ | 1-6, 28, 37, 40 |
| eJPT | 1-6, 7-11, 12, 15-16 |
| CEH | 1-6, 7-11, 12-17, 18-23 (broad, shallow) |
| OSCP | 3, 6-17, 18-22, 39 |
| PNPT | 7-9, 10-11, 12, 14, 17, 39 |
| GPEN | 7-11, 12-17, 24, 38 |
| GWAPT | 18-23 |
| CompTIA PenTest+ | 7-11, 12, 38-39 |
| OSEP | 17, 24, 27, 35 |
| OSED | 27, 28 |
| OSWE | 18-23 (deep white-box) |
| GXPN | 12-17, 27, 28 |
| CREST CRT | 7-23 |
| CREST CCT | Full curriculum |
| AWS Security | 29 |
| GCIH | 2, 37 |
| GCFA | 37 |
| CISSP | 40, 41 |
Recommended Certification Paths by Career Goal
Path 1: Penetration Tester (Corporate/Consulting)
Year 0-1: CompTIA Security+ OR eJPT
Year 1-2: OSCP
Year 2-3: GPEN or GWAPT (whichever covers your specialty gap)
Year 3-5: OSEP + CREST CRT (if UK/APAC market)
Year 5+: GXPN or CCT for senior/lead roles
Path 2: Web Application Security Specialist
Year 0-1: eJPT + PortSwigger Academy (free, complete it)
Year 1-2: OSCP + Burp Suite Certified Practitioner (BSCP)
Year 2-3: GWAPT or OSWE
Year 3-5: OSWE (if not yet obtained) + CREST CRT (Application)
Year 5+: CREST CCT (Application)
Path 3: Red Team Operator
Year 0-1: eJPT or CompTIA Security+
Year 1-2: OSCP
Year 2-3: OSEP + PNPT (for AD and OSINT emphasis)
Year 3-5: GXPN or OSED
Year 5+: CREST CCT + specialized red team training
Path 4: Bug Bounty Hunter
Certifications are less important for bug bounty — results matter more.
However, for skill development:
Phase 1: eJPT (practical foundations)
Phase 2: OSCP or PNPT (methodology and exploitation skills)
Phase 3: OSWE (source code review for deeper bugs)
Ongoing: PortSwigger Academy + HackerOne/Bugcrowd practice
Your bug bounty portfolio (disclosed reports, reputation score)
is more valuable than certifications in this career path.
Path 5: Security Leadership / Management
Year 0-2: CompTIA Security+ + OSCP (technical credibility)
Year 2-4: CISSP (management credential)
Year 4-6: CISM or CRISC (governance focus)
Year 6+: MBA or MS in Cybersecurity (if pursuing executive track)
Path 6: Government / Military (U.S. DoD)
DoD 8570 requirements drive certification choices:
IAT Level II: CompTIA Security+
CSSP Analyst: CEH or GCIA
CSSP IR: GCIH or CEH
CSSP Auditor: CEH or CISA
Pentest roles: OSCP + GPEN (above and beyond requirements)
Get the required certification first, then add OSCP for
technical depth and career advancement.
Cost Comparison Summary
| Certification | Exam Cost | Training Cost | Total Investment |
|---|---|---|---|
| CompTIA Security+ | ~$404 | $0-$500 | $404-$904 | ||
| eJPT | ~$249 | $0-$588/yr | $249-$837 | ||
| CEH | ~$1,199 | $0-$3,499 | $1,199-$4,698 | ||
| OSCP (PEN-200) | ~$1,749 | Included | $1,749-$2,749 | ||
| PNPT | ~$399 | $0-$299/yr | $399-$698 | ||
| GPEN | ~$979 | ~$8,525 | $979-$9,504 | |
| GWAPT | ~$979 | ~$8,525 | $979-$9,504 | |
| CompTIA PenTest+ | ~$404 | $0-$500 | $404-$904 | ||
| OSEP (PEN-300) | ~$1,749 | Included | $1,749-$2,749 | ||
| OSED (EXP-301) | ~$1,749 | Included | $1,749-$2,749 | ||
| OSWE (WEB-300) | ~$1,749 | Included | $1,749-$2,749 | ||
| GXPN | ~$979 | ~$8,525 | $979-$9,504 | |
| CREST CRT | ~$500-$1,500 | Variable | $500-$5,000+ |
Budget-conscious path: eJPT ($249) -> PNPT ($399) -> OSCP ($1,749) = ~$2,400 total for three industry-respected practical certifications.
Employer-sponsored path: Security+ -> GPEN (SEC560) -> GWAPT (SEC542) -> GXPN (SEC660) = ~$25,000+ but world-class training if your employer pays.
Study Tips for Certification Success
-
Active practice over passive study. For every hour of reading or watching videos, spend two hours in a lab. Certifications with practical exams (OSCP, PNPT, eJPT, OSEP) cannot be passed by reading alone.
-
Build an index. For GIAC exams (open book), a well-organized index is the difference between passing and failing. Start building it from day one of study.
-
Take practice exams under real conditions. Time yourself. No distractions. This reveals knowledge gaps while there is still time to fill them.
-
Study in focused blocks. 90-minute focused study sessions with breaks are more effective than 4-hour marathons with declining attention.
-
Teach what you learn. Write blog posts, record videos, or explain concepts to study partners. Teaching forces deeper understanding.
-
Join study groups. Discord servers and subreddits dedicated to specific certifications provide motivation, tips, and accountability.
-
Schedule your exam before you feel ready. A deadline creates urgency. Most people over-prepare because they lack a forcing function. If you have completed the study material and are passing practice exams, schedule the real exam within 2 weeks.
-
Failure is feedback, not finality. Many successful OSCP holders failed their first attempt. Analyze what went wrong, study the gaps, and try again. Retake fees are typically lower than initial attempts.
Certification vendors update their exams, pricing, and requirements regularly. Verify all details on the vendor's official website before making purchasing decisions. Prices listed are approximate and in U.S. dollars unless otherwise noted.