2015
18 hours
Section 1 Solid Introduction to Ethical Hacking and Penetration Testing
Section 2 Real World Information Intelligence Techniques
Section 3 Scanning and vulnerability Assessment
Section 4 Network Attacking Techniques
Section 5 Windows and Linux Attacking Techniques
Section 6 Windows and Linux Post-Exploitation Techniques
Section 7 Web Exploitation Techniques
Section 8 Windows Exploit Development
Section 9 The end but it is not the end