0. – Pentestration Testing: What You Should Know

 1. – Getting Comfortable With Kali Linux

 2. – The Essential Tools

 3. – Passive Information Gathering

4. – Active Information Gathering

 5. – Vulnerability Scanning

 6. – Buffer Overflows

 7. – Win32 Buffer Overflow Exploitation

 8. – Linux Buffer Overflow Exploitation

 9. – Working With Exploitation

 10. – File Transfers

 11. – Priviliege Escalation

 12. – Client Side Attacks

 13. – Web Application Attacks