Penetration Testing. A Hands-On Introduction to Hacking

Get Started. It's Free
or sign up with your email address
Rocket clouds
Penetration Testing. A Hands-On Introduction to Hacking by Mind Map: Penetration Testing. A Hands-On Introduction to Hacking

1. Setting Up Your Virtual Lab

2. Penetration Testing Primer

3. The Stages of Penetration Test

4. Pre-engagement

5. Information Gathering

6. Threat Modeling

7. Vulnerability Analysis

8. Exploitation

9. Post Exploitation

10. Reporting

11. Summary

12. Installing VMWare

13. Setting Up Kali Linux

14. Target Virtual Machines

15. Creating the Windows XP Target

16. Vulnerability Scan

17. Social Engineering

18. Penetration Test

19. Information Gathering

20. Open Source Intelligence (OSINT)

21. Threat Modeling

22. Vulnerability

23. Exploitation

24. High-Value

25. Executive Summary

26. Technical Report

27. Brief Look

28. Hands-on Experience

29. Virtual Lab

30. Bridged Connection

31. Network Address Translation

32. Host-Only Network

33. Antivirus Software

34. Man-In-The-Middle Attack

35. Framework

36. Custom-build

37. Trial Basis

38. Patches

39. Internet Protocol (IP)

40. Troubleshoot