| Lesson | Subject |
|---|---|
| 1 | Introduction to the Cource |
| 2 | Cybercrime Landscape |
| 3 | Planning a Penetration Test |
| 4 | Footprinting and Reconnaissance I |
| 5 | Footprinting and Reconnaissance IΙ |
| 6 | Wireless Hacking |
| 7 | Scanning I |
| 8 | Scanning II |
| 9 | Exploitation I |
| 10 | Exploitation II |
| 11 | Network Forensics |
| 12 | Password Cracking I |
| 13 | Password Cracking IΙ |
| 14 | Network forensics |
| 15 | Exploit Development |
| 16 | Web Application Enumeration |
| 17 | Vulnerability Scanning |
| 18 | Web Application Vulnerabilities I |
| 19 | Web Application Vulnerabilities II |
| 20 | Reporting a Penetration Test |