Introduction to penetration testing, Penetration testing methodology, reconnaissance, Google hacking, email harvesting, Open source intelligence and social media, enumeration, DNS enumeration, Port scanning, Vulnerability assessments, exploits and exploit development, bypassing antivirus, Post-exploitation techniques, Privilege escalation, Password retrieval and cracking, Pivoting, Web application hacking, SQL Injection, Cross-site scripting, Cross-site request forgery, Local and remote file inclusion.