- OWASP top 10
- COBIT ISACA Risk framework
- Cybersecurity best practices
- Information gathering
- Reconnaissance
- Attack vectors
- Getting access
- Privileges escalation
- Full control
- Risk management
- Vulnerability scanning
- Malware detection
- Network scanning
- Log review and analysis