Table of Contents

Table of Contents

Preface……………………………………….

For Everyone…………………….

For Teenagers…………………..

Acknowledgments……………………….

Introduction………………………………..

Software Notice………………………….

Getting Into Gear……………………

Programming Languages…………….

C/C++ Python Javascript

SQL & Databases

Setting Up a Lab………………………….

Encryption & Cryptography…………..

Passwords………………………………….

Operating Systems….………………….

Windows • Linux Unix MAC

Sandboxes

Virtual Machines

Networking…………………………………

Network Penetration Identifying Users

Geolocation of Users Wireless Networks

Air Dumping War Driving

Web Pages & Servers………………….

Browsers SQL Injection

DoS DDoS DMZ

Cloud Security…………………………….

Email…………………………………………

Viruses & Worms………………………..

Phones………………………………………

Android iPhone Windows

Games………………………………………

Drone Hacking……………………………

Car Hacking……………………………….

Tools………………………………………….

Being a Security Researcher……….

Bug Bounties

Glossary…………………………………….

Bibliography……………………………….

Suggested Reading…………………….

Web Sites & Links………………………

Notes………………………………………..

Index…………………………………………