Table of Contents
- Introduction
- Kali Linux
- Setting Up the Learning Environment: Metasploitable, Juice Shop
- Hacking Tools
- Offline Hacking
- Passwords
- IT Forensics
- Wi-Fi, Bluetooth, and SDR
- Attack Vector USB Interface
- External Security Checks
- Penetration Testing
- Securing Windows Servers
- Active Directory
- Securing Linux
- Security of Samba File Servers
- Intrusion Detection Systems
- Security of Web Applications
- Software Exploitation
- Bug Bounty Programs
- Security in the Cloud
- Securing Microsoft 365
- Mobile Security
- Internet of Things Security

