Book Content
chapters • 14h20m total length
1. Pen Testing Introduction
2. Choosing the virtual environment
3. Building a range
4. Identifying a range architecture
5. Identifying a Methodology
6. Creating an external attack architecture
7. Assessment of Devices
8. Architecting an IDS/IPS range
9. Assessment of Web Servers and Web Applications
10. Flat and Internal Testing networks
11. Attacking Servers
12. Exploring Client Side Attack Vectors
13. Building a complete cyber range














