top of page

PWPA: Everything you NEED to know

Writer's picture: Kyser ClarkKyser Clark

PWPA Badge Logo

I recently passed the TCM Security Practical Web Pentest Associate (PWPA) certification exam, and in this post, I’m going to break down everything you need to know about it. I’ll cover why I went for it, why you might want to consider it, tips for passing, how it compares to other certifications, and whether it’s worth it for your career.


Before we get into it, let me be clear: this post is not sponsored by TCM Security or anyone else. I’ve made a lot of certification-related content, and while some of it has been shared by certification providers, I haven’t been paid for any of it up to this point. My goal is to help you make informed career decisions in cybersecurity.


Related Video:


What is the PWPA?

The PWPA, formerly known as the Practical Junior Web Tester (PJWT), is a hands-on web application penetration testing certification. The name change from PJWT to PWPA makes sense—it better reflects the certification's actual difficulty and target audience.


The exam consists of two main parts:


  • 48 hours to hack, exploit, and find vulnerabilities inside a single web application.

  • Another 48 hours to write and submit a professional penetration testing report.


There are no multiple-choice questions, no flags to capture—it’s completely practical and designed to simulate a real-world web application penetration test.


One of the more challenging aspects of this exam is that the passing criteria are only revealed in the Rules of Engagement once you start. This makes it difficult to know exactly what’s required ahead of time. But rest assured—everything tested in the exam is covered in the course.


Why I Went for the PWPA

I initially pursued the PWPA because I was struggling with the OffSec Web Assessor (OSWA) certification. I failed OSWA three times and felt like I was missing some “hidden technique” that wasn’t covered in the course.


Since I passed the OffSec Certified Professional (OSCP) on my first attempt, partly due to doing a junior-level certification beforehand - the INE Security Junior Penetration Tester (eJPT), I figured doing the PWPA might help me get over the OSWA hurdle. Plus, I had heard great things about TCM Security’s training quality and exam format, and I wanted to know what the buzz was all about firsthand.


Another big reason? Affordability. At the time of taking it, the PWPA cost $250, including the course, exam attempt, and a free retake. As a military veteran, I got a 20% discount, bringing my total to $199. That’s great value for a web application penetration testing certification.


Who Should Consider the PWPA?

The PWPA is a great option if:


  1. You want to develop web app pentesting or bug bounty skills. The course itself is called "Practical Bug Bounty," and it covers real-world testing techniques.


  2. You want to prove your skills to employers or clients. Having a recognized certification can make a difference when trying to land a job or secure freelance work.


  3. You’re a cybersecurity professional, developer, or app sec specialist. If you don’t want to become a full-time pentester but need to understand web security better, this is a solid choice.


However, if you already have another web pentesting certification, like OSWA or Burp Suite Certified Practitioner (BSCP), PWPA might not be necessary—you may want to aim higher for something like Offsec Web Expert (OSWE), Hack The Box (HTB) Certified Bug Bounty Hunter (CBBH), HTB Certified Web Exploitation Expert (CWEE), or TCM Practical Web Pentest Professional (PWPP).


My Tips for Passing the PWPA

I failed my first attempt, and I’ll be honest—I underestimated the exam. The original "Junior" label made me think it would be an easy win, but it was far from it. Here’s what I learned:


1. Use All Your Time

I rushed through my exam and report, finishing in about 30 hours instead of the full 96. I thought I had enough points to pass, but I was wrong. Use all your time, dig deeper, and make sure you document everything.


2. Struggle More During Training

Don’t just watch the course videos and follow along. When the course tells you to try something on your own, really try it. Struggling through the labs helps you retain information better.


3. Avoid Looking at Walkthroughs Too Early

If you get stuck in a lab, don’t immediately jump to the solution. Watch just enough of a walkthrough to get a hint, then pause and try to figure out the next step yourself.


4. Write a Solid Report

Your report is just as important as the technical work. If you’re unsure about formatting, look up professional penetration testing reports and use them as references.


Bonus Nugget: Adaptability in Report Writing


I don’t have a single, personal style for penetration testing reports—because I don’t need one. When I take an OffSec exam, I use their official templates, OSCP, OSWA, and OSWP (Wireless Professional) all have different formats. For PWPA, I followed the TCM Security pentest report template. At work, I use my company’s standard format, and during my internship, I followed that organization’s structure. The key takeaway? Be adaptable. Every organization has its own style and expectations, and the best pentesters can adjust their reporting to fit different formats. The core principles remain the same, but flexibility in how you present findings is a skill worth mastering.


5. Take the Exam Seriously

Even though it’s marketed as an entry-level certification, it’s not easy. Treat it like a real-world web application pentest.


PWPA vs. Other Web Pentesting Certifications

If you’re comparing the PWPA to other web app pentesting certs, here’s how it stacks up:


PWPA vs. OSWA (OffSec Web Assessor)

  • PWPA is more realistic with zero flags; OSWA has flags to capture.

  • PWPA is more budget-friendly ($250 vs. OSWA’s $1,700+ price tag).

  • OSWA is significantly harder (five web apps in 24 hours vs. one web app in 48 hours).


PWPA vs. Hack The Box CBBH (Certified Bug Bounty Hunter)

  • PWPA has video-based training; CBBH is entirely text-based.

  • CBBH is more expensive and requires a subscription ($400+ per year).

  • PWPA is more beginner-friendly


PWPA vs. BSCP & eWPT

  • BSCP and INE Web Application Penetration Tester (eWPT) require renewal fees, while PWPA is good for life.


If you already have a web pentesting certification, you’re probably better off skipping the PWPA and going for something more advanced.


Is the PWPA Worth It?

For the price, quality, and hands-on nature, the PWPA is 100% worth it—if it’s your first web pentesting certification. It’s one of the best budget-friendly options available.


However, if you already have web pentesting experience or a higher-level certification, you should probably skip it and go for something more challenging, like OSWA, OSWE, CBBH, CWEE, or PWPP.


If you’re just getting started in web pentesting, PWPA is the best entry-level certification you can get. It’s affordable, well-structured, and simulates a real-world pentest better than many alternatives.


If you’re considering other certifications, check out my full breakdown of how I failed OSWA three times before passing—it’s packed with lessons that apply to any pentesting exam.


305 views

Related Posts

See All
bottom of page