Course content
Introduction
Setting Up Your Environment
Anonymity
Getting started with Linux
Networking Fundamentals
Passive Information Gathering
Active Information Gathering
Netcat
Getting started with Metasploit
Web Server Hacking
Exploitation
Wired and WIreless attacks
Post Exploitation & Privilege Escalation