Getting started: essential knowledge -- Reconnaissance: information gathering for the ethical hacker -- Scanning and enumeration -- Sniffing and evasion -- Attacking a system -- Web-based hacking: servers and applications -- Wireless network hacking -- Mobile communications and the IoT -- Security in cloud computing -- Trojans and other attacks -- Cryptography 101 -- Low tech: social engineering and physical security -- The pen test: putting it all together.