Module 1: Introduction to Pentesting and Information Security
Module 2: Networking
Module 3: Bash Scripting
Module 4: Web Applications
Module 5: Reconnaissance & Information Gathering
Module 6: Footprinting and Scanning
Module 7: Advanced Scanning Techniques
Module 8: Vulnerability Assessment
Module 9: Network Attacks
9.1 Authentication Cracking
9.2 Windows Shares
9.3 Null Sessions
9.4 ARP Poisoning
9.5 Metasploit
9.6 Meterpreter
9.7 Privilege Escalation
9.8 Antivirus Evasion
Module 10: Anonymity
Module 11: System Attacks
11.1 Malware
11.2 Password Attacks
11.3 Buffer Overflow
Module 12: Web Attacks
Module 13: Active Directory Attacks
Module 14: Next Steps
Module 15: Penetration Testing and Capture the Flag (CTF) Labs