Detailed Course Outline
- Module 1: Footprinting and Information Gathering
- Module 2: Scanning and Enumeration
- Module 3: Attacking Windows Hosts
- Module4: Attacking Linux Hosts
- Module 5: Attacking Active Directory
- Module 6: Attacking Web Applications
- Module 7: Exploit Dev and Buffer Overflows