r vulnerability testing The OSI model of networking IP, TCP, UDP and ICMP protocols including IP based routing and the TCP state chart Key network services including DNS How a TCP/IP network can be profiled and have its topology mapped How to configure and manage a network device How to subvert a network and bypass network based security mechanisms The role and function of service in a network ena