Resources

Virtual Machines

Cheat Sheets

Linux:

Lecture Slides

# Topic
1 Welcome & Introduction
2 Networking Recap of COMP 177
3 Penetration Testing: Overview
4 Penetration Testing: Reconnaissance
5 Penetration Testing: Scanning
6 Penetration Testing: Vulnerability Scanning
7 Penetration Testing: Exploitation
8 Penetration Testing: Post-Exploitation
9 XP Challenge Labs
10 Penetration Testing: Social Engineering
11 Network Security Devices: Firewalls, IDS, Honeypots
12 Penetration Testing: Physical Security
Bonus-01 Bonus Topic: NAT Slipstream Attacks
Bonus-02 Bonus Topic: TCP Middlebox Amplification Attacks

Cryptography