Security Testing Introduction
Information Gathering & Enumeration
Vulnerability Scanning
Authentication or brute-force Attacks
Exploiting Vulnerabilities