• Information Gathering
• Firewall, IPS/IDS and Web Filtering Systems
• Firewall, IPS/IDS and Web Filter Evasion/Bypass
• Scanning, Enumeration
• Vulnerability Assessment and Exploit Tools
• Nexpose
• Nessus
• Arachni
• Introduction to Metasploit Framework and Exploits
• Known Exploits
• Tunneling Techniques
• HTTP Tunneling
• ICMP Tunneling
• DNS Tunneling
• Local/Remote/Dynamic Port Forwarding
• Social Engineering Attacks
• Phishing, Spear Phishing
• DoS Attacks
• Malware Attacks
• Teardrop, smurf, ping-og-death
• Network Hacking
• Session Hijacking
• Man in the middle Attacks
• IP Spoofing
• Web Hacking
• Bruteforce Attacks
• SQL Injection Attacks
• TCP/IP Vulnerabilities
• Network Traffic Anaysis