Penetration Testing
I. Penetration Testing Fundamentals
1. What is Penetration Testing
2. Types of Penetration Testing
3. Pentesting Methodologies
4. Rules of Engagement
5. Scoping & Planning
6. Information Gathering
7. Threat Modeling
8. Pentest Lab Setup
9. Pentesting Tools Overview
10. Ethics & Compliance
II. Reconnaissance & Vulnerability
11. Network Reconnaissance
12. Asset Discovery
13. Port & Service Enumeration
14. VA vs Pentesting
15. Automated Scanning
16. Manual Vulnerability Analysis
17. Exploit Research
18. CVE & Exploit Databases
19. Risk Rating
20. Recon Best Practices
III. Exploitation & Post-Exploitation
21. Exploitation Fundamentals
22. Exploiting Network Services
23. Web Exploitation
24. Privilege Escalation
25. Credential Attacks
26. Lateral Movement
27. Persistence
28. Post-Exploitation Enumeration
29. Data Exfiltration
30. Evading Detection
31. Pivoting
32. Wireless Exploitation
33. Exploiting Misconfigurations
34. Cleanup & Covering Tracks
35. Exploitation Defense
IV. Reporting & Real-World Practice