1
Module 01 : Penetration Testing: What You Should Know
2
Module 02 : Comprehensive Pentest Planning, Scoping, and Recon
3
Module 03 : In-Depth Scanning
5
Module 05 : Domain Domination
6
Module 06 : Getting Comfortable with Kali Linux
7
Module 07 : Command Line Fun
8
Module 08 : Practical Tools
9
Module 09 : Bash Scripting
10
Module 10 : Passive Information Gathering
11
Module 11 : Active Information Gathering
12
Module 12 : Vulnerability Scanning
13
Module 13 : Web Application Attacks
14
Module 14 : Introduction to Buffer Overflows
15
Module 15 : Windows Buffer Overflows
16
Module 16 : Linux Buffer Overflows
17
Module 17 : Client-Side Attacks
18
Module 18 : Locating Public Exploits
19
Module 19 : Fixing Exploits
20
Module 20 : File Transfers
21
Module 21 : Antivirus Evasion
22
Module 22 : Privilege Escalation
23
Module 23 : Password Attacks
24
Module 24 : Port Redirection and Tunneling
25
Module 25 : Active Directory Attacks
26
Module 26 : The Metasploit Framework
27
Module 27 : PowerShell Empire
28
Module 28 : Assembling the Pieces: Penetration Test Breakdown
29
Module 29 : Trying Harder: The Labs
Ask A Question