Contents: Pt. I Setting Up Ch. 1 Introduction Ch. 2 Ethics and Hacking Ch. 3 Hacking as a Career Ch. 4 Setting up Your Lab Ch. 5 Creating and Using PenTest Targets in Your Lab Ch. 6 Methodologies Ch. 7 PenTest Metrics Ch. 8 Management of a PenTest Pt. II Running a PenTest Ch. 9 Information Gathering Ch. 10 Vulnerability Identification Ch. 11 Vulnerability Verification Ch. 12 C…