Book Content
chapters • 18h48m total length
1. Introduction
2. Setting up The Lab
3. Linux Basics
4. Network Penetration Testing
5. Network Penetration Testing - Pre Connection Attacks
6. Network Penetration Testing - Gaining Access (WEP/WPA/WPA2 Cracking)
7. Post Connection Attacks
8. Man-in-the-middle Attacks
9. Network Penetration Testing - Detection & Security
10. Gaining Access to Computer Devices
11. Scanning vulnerabilities using Tools
12. Client Side Attacks
13. Client Side Attacks - Social Engineering
14. Attack and Detect Trojans with BeEF
15. Attacks Outside The Local Network
16. Post Exploitation
17. Website Penetration Testing
18. Website Pentesting - Information Gathering
19. File Upload, Code Execution & File Inclusion Vulns
20. SQL Injection Vulnerabilities
21. Cross Site Scripting Vulnerabilities
22. Website Pentesting - Discovering Vulnerabilities Automatically Using OWASP ZAP














