Introduction
  • Introduction
Planning and Scoping
  • Planning a Pen Test
  • Rules of Engagement
  • Resources and Budget
  • Impact and Constraints
  • Support Resources
  • Legal Groundwork
  • Scope Considerations
  • Lab Environment Setup
  • Project Strategy and Risk
  • Scope Vulnerabilities
  • Compliance-Based Assessments
  • Planning and Scoping Quiz
Surveying the Target
  • Scanning and Enumeration
  • Scanning Demo
  • Packet Investigation
  • Packet Inspection Demo
  • Application and Open-Source Resources
  • Vulnerability Scanning
  • Vulnerability Scanning Demo
  • Target Considerations
  • Nmap Timing and Performance Options
  • Prioritization of Vulnerabilities
  • Common Attack Techniques
  • Credential Attacks
  • Weaknesses in Specialized Systems
  • Surveying the Target
Select Your Attack Vector
  • Remote Social Engineering
  • Spear Phishing Demo
  • In-Person Social Engineering
  • Network-Based Exploits
  • FTP Exploit Demo
  • Man-in-the-middle Exploits
  • Wireless Exploits
  • Application Exploits, Part 1
  • SQL Injection Demo
  • Application Exploits, Part 2
  • Application Exploits, Part 3
  • Cross-Site Scripting Demo
  • Code Vulnerabilities
  • Local Host Vulnerabilities
  • Privilege Escalation (Linux)
  • Privilege Escalation (Windows)
  • Misc. Privilege Escalation
  • Misc. Local Host Vulnerabilities
  • Physical Security
  • Post-Exploitation Techniques
  • Persistence and Stealth
  • Selecting Your Attack Vector
Selecting Pen Testing Tools
  • Nmap Scoping & Output Options
  • Pen Testing Toolbox
  • Using Kali Linux
  • Scanners & Credential Tools
  • Code-Cracking Tools
  • Open-Source Research Tools
  • Wireless and Web Pen Testing Tools
  • Remote Access Tools
  • Analyzers and Mobile Pen Testing Tools
  • Other Pen Testing Tools
  • Using Scripting in Pen Testing
  • Bash Scripting Basics
  • Bash Scripting Techniques
  • PowerShell Scripts
  • Ruby Scripts
  • Python Scripts
  • Scripting Languages Comparison
  • Selecting Pen Testing Tools
Reporting and Communication
  • Writing Reports
  • Post-Report Activities
  • Mitigation Strategies
  • Communication
  • Reporting and Communication
Practice Tests
  • CompTIA PenTest+ Practice Test
  • Certified Ethical Hacker, CEH Practice Test