Table of Contents
- Foundations of Ethical Hacking and Kali Linux
- Information Gathering and Network Scanning
- Executing Vulnerability Assessment
- Exploitation Techniques
- Post-Exploitation Activities
- Wireless Network Security and Exploitation
- Web Application Attacks
- Hands-on Shell Scripting with Error Debugging Automation
- Real-World Penetration Testing Scenarios