Book Content
chapters • 14h8m total length
1. Introduction to Penetration Testing
2. Getting Started with Kali Linux
3. Performing Information Gathering
4. Mastering Social Engineering
5. Diving into the Metasploit Framework
6. Understanding Password Attacks
7. Working with Burp Suite
8. Attacking Web Applications
9. Getting Started with Wireless Attacks
10. Moving Laterally and Escalating Your Privileges
11. Antivirus Evasion
12. Maintaining Control within the Environment
13. Reporting and Acting on Your Findings
14. Where Do I Go from Here?
15. Assessments














