Description
TABLE OF CONTENT
1 . Introduction to Penetration Testing
2 . Networking Fundamentals
3 . Information Gathering and Enumeration
4 . Scanning and Vulnerability Assessment
5 . Exploitation and Post-Exploitation
6 . Web Application Security
7 . Wireless Network Security
8 . Cryptography
9 . Social Engineering
10 . Reporting and Documentation
11 . Legal and Ethical Considerations