Engagement Lifecycle.
Law & Compliance.
Understanding Explaining and Managing Risk.
Record Keeping, Interim Reporting & Final Results.
IP Protocols.
Network Architectures.
Network Mapping & Target Identification.
Interpreting Tool Output.
Filtering Avoidance Techniques.
OS Fingerprinting.
Application Fingerprinting and Evaluating Unknown Services.
Network Access Control Analysis.
Cryptography.
Applications of Cryptography.
File System Permissions.
Audit Techniques.
Registration Records.
Domain Name Server (DNS).
Customer Web Site Analysis.
Google Hacking and Web Enumeration.
NNTP Newsgroups and Mailing Lists.
Information Leakage from Mail & News.
Headers.
Management Protocols.
Network Traffic Analysis.
Networking Protocols.
IPSec.
VoIP.
Wireless.
Configuration Analysis.
Domain Reconnaissance.
User Enumeration.
Active Directory.
Windows Passwords.
Windows Vulnerabilities.
Windows Patch Management Strategies.
Desktop Lockdown.
Exchange.
Common Windows Applications.
User enumeration.
Unix vulnerabilities.
FTP.
Sendmail / SMTP.
Network File System (NFS).
R* services.
X11.
RPC services.
SSH.
Web Server Operation.
Web Servers & their Flaws.
Web Enterprise Architectures.
Web Protocols.
Web Mark-up Languages.
Information Gathering from Web Mark up.
Authentication Mechanisms.
Authorisation Mechanisms.
Input Validation.
Information Disclosure in Error Messages.
Use of Cross Site Scripting Attacks.
Use of Injection Attacks.
Session Handling Encryption.
Source Code Review.
Web Site Structure Discovery.
Cross Site Scripting Attacks.
SQL Injection.
Parameter .Manipulation.
Directory Traversal.
File Uploads.
Code Injection.
Microsoft SQL Server.
Oracle RDBMS.
Web / App / Database Connectivity.