Hacking
Network Security Exploitation and countr measures to prevent it.
Perform hierarchical network attack methodology: Reconnaissance; Scanning; Vulnerability Identification; Exploitation; Post Exploitation Use different scanning and vulnerability testing tools and concepts like nmap and nessus. Exploit Network and also particular host using metasploit for DoS and shell access. Man in the middle attack: sslstrip