1) Introduction to Vulnerability Assessment and
Penetration Testing
2) Information Gathering Methodology
3) Identify Vulnerabilities
4) Exploitation
5) Post Exploitation
6) Advanced Tips and Techniques
7) Preparing a Report
8) Practice Ranges