PEN-200 | Notion
1. Copyright
2. Penetration Testing with Kali Linux: General Course
Information
3. Introduction To Cybersecurity
4 Effective Learning Strategies
5. Report Writing for Penetration Testers
6. Information Gathering
7. Vulnerability Scanning
8. Introduction to Web Application Attacks
9. Common Web Application Attacks
10. SQL Injection Attacks
11. Client-side Attacks
12. Locating Public Exploits
13. Fixing Exploits
14. Antivirus Evasion