1. Getting Started
  2. Passive Reconnaissance
  3. Active Reconnaissance
  4. Development Environment for Advanced Techniques
  5. Forensic Analysis
  6. Metadata Extraction and Parsing
  7. Malware and Phishing Analysis
  8. Working with Wireless Devices
  9. Working with Network Utilities
  10. Source Code Review and Reverse Engineering
  11. System Hardening, Discovery, and Implementation
  12. Defensive Security Techniques
  13. Offensive Security Techniques and Pen Testing