How to use Wireshark to capture network traffic.
Get your website up and running in minutes using Apache.
How the incorrect use of port knocking can lead to system compromise.
The basics of finding And exploiting vulnerabilities using Metasploit.
How attackers can exploit misconfigured Cron permissions to gain root access.
How to get started hacking Android applications.
How to perform source code review to find vulnerabilities in web applications.
And how attackers bypass account lockout when brute-forcing passwords.