The penetration testing roadmap - 6 steps at a glance
Before diving into each step in detail, here is the complete penetration testing roadmap so you have the full picture upfront:
Table of Contents
Penetration testing is one of the most in-demand cybersecurity roles in India right now - and one of the most misunderstood. Most people who want to become a penetration tester don't have a clear picture of the actual path.
They know it pays well. They know it involves something called "ethical hacking". Beyond that, things get vague quickly.
This guide gives you the exact roadmap. Not a generic list of skills to Google - a step-by-step path with timelines, tools, and what to learn at each stage. Whether you're a fresh graduate, a networking professional, or someone completely new to IT, the same roadmap applies.
If you are still deciding whether penetration testing is the right career for you, start with our guide to penetration testing courses first. If you are already convinced - this is the roadmap you need.
Before diving into each step in detail, here is the complete penetration testing roadmap so you have the full picture upfront:
Learn TCP/IP, subnetting, Kali Linux command line, and how traffic flows across systems.
Every penetration tester starts here, whether they admit it or not. You cannot hack what you don't understand. Before you run a single attack tool, you need to understand how systems communicate, how packets move across a network, and how to navigate a Linux terminal with confidence.
Tools: Wireshark, Nmap, Kali Linux, VirtualBox or VMware
Learn: OSI Model, TCP/IP, IP subnetting, DNS, HTTP/S, Linux CLI, file permissions, bash scripting basics
Study OWASP Top 10, web vulnerabilities, Active Directory attacks, and network exploitation.
This is the stage most people want to jump straight to - and it's why they struggle. Knowing the attack comes after knowing the system. At this stage you learn the techniques, tools, and methodologies that penetration testers actually use in client engagements.
The key at this stage is learning the methodology - not just the tools. A professional pentester follows the PTES (Penetration Testing Execution Standard) or OWASP testing guide from start to finish. They don't just run Metasploit and hope something works.
Tools: Burp Suite Pro, Metasploit, SQLMap, BloodHound, Nessus, Responder, Mimikatz
Learn: OWASP Top 10, SQL injection, XSS, authentication bypasses, Active Directory enumeration and attacks, network exploitation, post-exploitation and pivoting
Practice daily in real lab setups - not just watch tutorials. This is where skills actually form.
Watching a tutorial and doing it yourself are two completely different things. This is the step that separates people who genuinely become penetration testers from people who stay permanently in the 'learning phase.'
Good lab practice means setting up your own attack environment - a Kali Linux VM targeting deliberately vulnerable machines - and working through real attack chains from beginning to end. Not just running one tool and calling it done.
If you're doing this independently, plan for 2 hours of lab time per day minimum. If you're in a structured program with dedicated lab sessions built into the schedule, that structure does the discipline work for you - which is one of the biggest practical advantages of a formal course over self-study.
Tools: DVWA, bWAPP, Metasploitable, HackTheBox (free tier), TryHackMe
Learn: End-to-end attack chains: Recon → Scan → Exploit → Privilege Escalation → Lateral Movement → Report. At least one lab session every day.
A structured program compresses years of self-study into a disciplined 3-month curriculum.
Self-study will get you somewhere. A structured course gets you there significantly faster - and more importantly, with the habits and methodology that employers actually evaluate in interviews.
There's a meaningful difference between watching YouTube tutorials and going through a curriculum that's been built to take you from zero to job-ready in a defined timeframe. If you want to understand what a quality penetration testing course looks like - what it should cover, what to look for, and what the red flags are - our Part 1 guide covers this in detail.
AimNxt's 3-month Ethical Hacking and VAPT program is structured around exactly this roadmap - 80 dedicated lab days built into the schedule, small batch sizes of 15-20 students, and a capstone penetration test that produces a real portfolio piece before you graduate. The curriculum covers all 6 steps of this roadmap in sequence, so you're not piecing it together.
Tools: All tools from Steps 1-3, plus cloud testing tools (S3Scanner, AzureHound), mobile tools (Frida, APKTool)
Learn: 16-module structured curriculum: Networking → Linux → Windows/AD → Web attacks → Network exploitation → Cloud/Mobile → Report writing → Capstone project
A structured program compresses years of self-study into a disciplined 3-month curriculum.
Certifications in penetration testing are not all equal. The one you pursue should match where you are in your journey and what kind of role you're targeting.
AimNxt's curriculum is designed to prepare students for CEH, CompTIA PenTest+, and eJPT simultaneously with the course. Details on each certification are available directly from EC-Council and Offensive Security for OSCP.
Tools: eJPT, CompTIA PenTest+, CEH, OSCP, GPEN
Learn: Basic to advanced penetration testing skills including recon, exploitation, methodology, ethical hacking tools, and real-world attack techniques
Capstone pentest report, GitHub lab documentation, LinkedIn optimisation, mock interviews.
This step is where a lot of technically capable people lose momentum. They finish the course, have the skills, and then spend six weeks perfecting their CV before sending a single application. Don't do that.
Your portfolio only needs three things to be interview-ready: a GitHub profile with documented lab walkthroughs showing your methodology, a professional capstone pentest report that you can walk through in an interview, and a LinkedIn profile that uses the right keywords (penetration tester, VAPT, ethical hacking) so recruiters can actually find you.
Start applying before you feel completely ready. The technical interview will tell you more about your actual gaps than another month of solo studying will. Apply, get feedback, iterate.
Tools: GitHub, LinkedIn, Naukri.com, LinkedIn Jobs, HackerOne (bug bounty)
Learn: Capstone pentest report, 3 documented lab projects on GitHub, ATS-optimised resume with pentest keywords, Mock technical interview preparation
Skills matter more in the technical interview because you must demonstrate how you think, test, exploit, and report. Certifications matter because they help recruiters shortlist your profile in the first place.
The practical conclusion is simple: build strong practical skills first, then get certified to make those skills visible on paper.
Most people who try to become a penetration tester make the same set of mistakes. Knowing them in advance saves months of wasted effort.