Table of Contents
- Pen Testing Introduction
- Choosing the virtual environment
- Building a range
- Identifying a range architecture
- Identifying a Methodology
- Creating an external attack architecture
- Assessment of Devices
- Architecting an IDS/IPS range
- Assessment of Web Servers and Web Applications
- Flat and Internal Testing networks
- Attacking Servers
- Exploring Client Side Attack Vectors
- Building a complete cyber range

