-
Module 01: Penetration Testing: What You Should Know
-
Module 02: Getting Comfortable with Kali Linux
-
Module 03: Command Line Fun
-
Module 04: Practical Tools
-
Module 05: Bash Scripting
-
Module 06: Passive Information Gathering
-
Module 07: Active Information Gathering
-
Module 08: Vulnerability Scanning
-
Module 09: Web Application Attacks
-
Module 10: Introduction to Buffer Overflows
-
Module 11: Windows Buffer Overflows
-
Module 12: Linux Buffer Overflows
-
Module 13: Client-Side Attacks
-
Module 14: Locating Public Exploits
-
Module 15: Fixing Exploits
-
Module 16: File Transfers
-
Module 17: Antivirus Evasion
-
Module 18: Privilege Escalation
-
Module 19: Password Attacks
-
Module 20: Port Redirection and Tunneling
-
Module 21: Active Directory Attacks
-
Module 22: The Metasploit Framework
-
Module 23: PowerShell Empire
-
Module 24: Assembling the Pieces: Penetration Test Breakdown
-
Module 25: Trying Harder: The Labs