Book Content
chapters • 17h28m total length
1. Introducing Penetration Testing
2. Choosing the Virtual Environment
3. Planning a Range
4. Identifying Range Architecture
5. Identifying a Methodology
6. Creating an External Attack Architecture
7. Assessment of Devices
8. Architecting an IDS/IPS Range
9. Assessment of Web Servers and Web Applications
10. Testing Flat and Internal Networks
11. Attacking Servers
12. Exploring Client-side Attack Vectors
13. Building a Complete Cyber Range














