1. Overview
2. Pentesters - The Good, Bad and Ugly
3. Pre-Engagement
4. Pre-Engagement Part 2
5. Data Security Agreements
6. Statement of Work (SOW)
7. Statement of Work (SOW) Part 2
8. Statement of Work (SOW) Part 3
9. Final Authorization
10. Personal Engagement Toolkit
11. Pentesting Platforms
12. Stages of Assessment Validate Scope
13. Stages of Assessment Recon
14. Stages of Assessment Vulnerability Scan
15. Stages of Assessment Vulnerability Scan Part 2
16. Stages of Assessment Documenting
17. Stages of Assessment Exploitation
18. Stages of Assessment Maintaining Access
19. Stages of Assessment Covering Tracks
20. Stages of Assessment Deliverables
21. Blue Team Pentesting