1. The Basics of Penetration Testing
  2. Penetration Testing Lab
  3. Finding Your Way Around Kali Linux
  4. Understanding the PT Process and Stages
  5. Planning and Reconnaissance
  6. Service Enumeration and Scanning
  7. Vulnerability Research
  8. Exploitation
  9. Post Exploitation
  10. Reporting