Background The History and Basics of Pentesting Education Certifications and Courses Tools Software and Vulnerable Resources Threats Common Threats and Vulnerabilities Frameworks Pentesting Frameworks LAMP LAMP Server Pentesting