Chapter 01: Security Trends: Past and Present.- Chapter 02: Why VirtualBox is a Solution.- Chapter 03: Elementary Linux Commands.- Chapter 04: Know Your Network.- Chapter 05: How to Build a Kali Web Server.- Chapter 06: Kali Linux Inside-Out.- Chapter 07: Kali and Python.- Chapter 08: Information Gathering.- Chapter 09: SQL Mapping.- Chapter 10: Vulnerability Analysis.- Chapter 11: Information Assurance Model.- Chapter 12: Metaspoilt in Kali Linux.- Chapter 13: Hashes and Passwords.- Chapter 14: Classical and Modern encryption.- Chapter 15: Exploiting Remote Targets.