
Replay Attacks
The basics of how a replay attack works, common uses of a replay attack, and how to prevent a replay attack in your web application.

Information Gathering Foundations
Introduction to information gathering and auditing of machines and networks.

Using Burpsuite
Introduction to the HTTP protocol and web proxy tools such as Burpsuite.

Social Engineering
Common techniques and terms relating to social engineering as well as some of the theory behind it. Also goes over some helpful tools to launch your own attacks.
