2-Network Security

1- Information Gathering
2- Scanning
3- Enumeration
4- Sniffing and MitM Attacks
5- Exploitation
6- Post Exploitation
7- Anonymity
8- Social Engineering