Background

The History and Basics of Pentesting

Education

Certifications and Courses

Tools

Software and Vulnerable Resources

Threats

Common Threats and Vulnerabilities

Frameworks

Pentesting Frameworks

LAMP

LAMP Server Pentesting