What Problem Hacking Identify Hacking Process Importance of Ethical Hacking Miscellaneous Hackers Clients and Servers Password Cracking Penetration Testing Routers and Firewall Vulnerability Assessment vs Penetration Testing Methods of Information Gathering Cross-site Scripting Defend Against Password Cracking Website vs Webpage Risk of DNS spoofing and Poisoning Basic Msfconsole Commands