Table of Contents
- Introducing Penetration Testing
- Choosing the Virtual Environment
- Planning a Range
- Identifying Range Architecture
- Identifying a Methodology
- Creating an External Attack Architecture
- Assessment of Devices
- Architecting an IDS/IPS Range
- Assessment of Web Servers and Web Applications
- Testing Flat and Internal Networks
- Attacking Servers
- Exploring Client-side Attack Vectors
- Building a Complete Cyber Range

