Chapter 1: Getting Started: Essential Knowledge Chapter 2: Reconnaissance: Information Gathering for the Ethical Hacker Chapter 3: Scanning and Enumeration Chapter 4: Sniffing and Evasion Chapter 5: Attacking a System Chapter 6: Web-Based Hacking: Servers and Applications Chapter 7: Wireless Network Hacking Chapter 8: Mobile Communications and the IoT Chapter 9: Security in Cloud Computing Chapter 10: Trojan and Other Attacks Chapter 11: Cryptography 101 Chapter 12: Low Tech: Social Engineering and Physical Security Chapter 13: The Pen Test: Putting It All Together Appendix A: Tools, Sites, and References Glossary