2 Table of Contents: ... methodologies; Ethical hacking; Penetration testing; Vulnerability assessment; Security audits; Considerations...