1. Copyright

2. Penetration Testing with Kali Linux: General Course Information

3. Introduction To Cybersecurity

4 Effective Learning Strategies

5. Report Writing for Penetration Testers

6. Information Gathering

7. Vulnerability Scanning

8. Introduction to Web Application Attacks

9. Common Web Application Attacks

10. SQL Injection Attacks

11. Client-side Attacks

12. Locating Public Exploits

13. Fixing Exploits

14. Antivirus Evasion