Attacking HostsCredential Attacks and Testing ToolsRemote AccessAttacking Virtual Machines and ContainersAttacking Cloud TechnologiesAttacking Mobile DevicesAttacking IoT, ICS, Embedded Systems, and SCADA DevicesAttacking Data StorageSummaryExam EssentialsLab ExercisesReview Questions