1. Foundations of Ethical Hacking and Kali Linux
  2. Information Gathering and Network Scanning
  3. Executing Vulnerability Assessment
  4. Exploitation Techniques
  5. Post-Exploitation Activities
  6. Wireless Network Security and Exploitation
  7. Web Application Attacks
  8. Hands-on Shell Scripting with Error Debugging Automation
  9. Real-World Penetration Testing Scenarios