CHAPTER 1 Introduction to Ethical Hacking and Penetration Testing
CHAPTER 2 Planning and Scoping a Penetration Testing Assessment
CHAPTER 3 Information Gathering and Vulnerability Scanning
CHAPTER 4 Social Engineering Attacks
CHAPTER 5 Exploiting Wired and Wireless Networks
CHAPTER 6 Exploiting Application-Based Vulnerabilities
CHAPTER 7 Cloud, Mobile, and IoT Security
CHAPTER 8 Performing Post-Exploitation Techniques
CHAPTER 9 Reporting and Communication
CHAPTER 10 Tools and Code Analysis
APPENDIX A Answers to the “Do I Know This Already?” Quizzes and Q&A Sections
APPENDIX B CompTIA® PenTest+ PT0-002 Cert Guide Exam Updates
Online Elements: