- Chapter 1 – Introduction
- Chapter 2 – Networking
- Chapter 3 – Footprinting/Reconnaissance
- Chapter 4 – Google Hacking
- Chapter 5 – Scanning
- Chapter 6 – System Hacking: Win7 and Linux
- Chapter 7 – Android & iPhone Hacking
- Chapter 8 – Malwares
- Chapter 9 – SQL Injection
- Chapter 10 – Cross Site Scripting
- Chapter 11 – Sniffing
- Chapter 12 – Social Engineering
- Chapter 13 – Identity Theft Fraud
- Chapter 14 – Denial of Service
- Chapter 15 – Session Hijacking
- Chapter 16 – Penetration Testing
- Chapter 17 – Exploit Writing & Buffer Overflow
- Chapter 18 – Cryptography & Steganography
- Chapter 19 – Firewalls & Honeypots
- Chapter 20 – IDS & IPS
- Chapter 21 – Hacking Web Server
- Chapter 22 – Wireless Hacking
- Chapter 23 – Physical Security
- Chapter 24 – Reverse Engineering
- Chapter 25 – Email Hacking
- Chapter 26 – Security Compliance & Auditing
- Chapter 27 – Incident Handling & Computer forensics