➔ MODULE 01: Penetration Testing: What You Should Know
➔ MODULE 02: Getting Comfortable with Kali Linux
➔ MODULE 03: Command Line Fun
➔ MODULE 04: Practical Tools
➔ MODULE 05: Bash Scripting
➔ MODULE 06: Passive Information Gathering
➔ MODULE 07: Active Information Gathering
➔ MODULE 08: Vulnerability Scanning
➔ MODULE 09: Web Application Attacks
➔ MODULE 10: Introduction to Buffer Overflows
➔ MODULE 11: Windows Buffer Overflows
➔ MODULE 12: Linux Buffer Overflows
➔ MODULE 13: Client-Side Attacks
➔ MODULE 14: Locating Public Exploits
➔ MODULE 15: Fixing Exploits
➔ MODULE 16: File Transfers
➔ MODULE 17: Antivirus Evasion
➔ MODULE 18: Privilege Escalation
➔ MODULE 19: Password Attacks
➔ MODULE 20: Port Redirection and Tunneling
➔ MODULE 21: Active Directory Attacks
➔ MODULE 22: The Metasploit Framework
➔ MODULE 23: PowerShell Empire
➔ MODULE 24: Assembling the Pieces: Penetration Test Breakdown
➔ MODULE 25: Trying Harder: The Labs