• Security Testing Introduction
  • Information Gathering & Enumeration
  • Vulnerability Scanning
  • Authentication or brute-force Attacks
  • Exploiting Vulnerabilities