• Network scanning methodologies
  • Vulnerability identification and analysis