Summary Assessment Methodologies Enumeration Information Gathering General Knowledge Compliance Cybersecurity Basics DNS Frameworks Linux Commands Vulnerability Assessment Host & Networking Penetration Testing Exploitation Post-Exploitation Social Engineering