Introduction to Basics of Penetration Testing
Understand the scope of penetration testing
Report writing and recommending new strategies
Planning and key aspects of compliance-based assessments
Information gathering & identification of vulnerability
Exploiting network, wireless, application
How to perform post-exploitation techniques
Penetration testing tools to analyze the output and basic scripts