1. Analyze Cryptography, DNS, and Windows security principles.
2. Analyze different attacking techniques of an intruder.
3. Apply different exploitation techniques to gain access.
4. Interpret web exploitation tools and attacks .
5. Summarize defense mechanisms and forensics