Table of Contents
- Getting Started
- Passive Reconnaissance
- Active Reconnaissance
- Development Environment for Advanced Techniques
- Forensic Analysis
- Metadata Extraction and Parsing
- Malware and Phishing Analysis
- Working with Wireless Devices
- Working with Network Utilities
- Source Code Review and Reverse Engineering
- System Hardening, Discovery, and Implementation
- Defensive Security Techniques
- Offensive Security Techniques and Pen Testing