• Practical use of tools like Wireshark, Nmap, and Metasploit.
  • Configuring and testing network defenses.