Comprehensive evaluation and understanding of Reconnaissance.
Comprehensive evaluation and understanding of Exploitation Techniques.
Comprehensive evaluation and understanding of Post-Exploitation.
Comprehensive evaluation and understanding of Metasploit Framework.