Table of Contents
- Cybersecurity, Career Path, and Prospects
- Introduction to Penetration Testing
- Setting Up Your Lab for Penetration Testing
- Web Application and API Penetration Testing
- The Art of Secure Source Code Review
- Penetration Testing Android Mobile Applications
- Network Penetration Testing
- Wireless Penetration Testing
- Report Preparation and Documentation
- A Day in the Life of a Pen Tester