- Understand how common vulnerabilities and implementation flaws weaken the security
- Identify attack surfaces of system layers and their impacts on confidentiality, integrity
- Replicate real-world attacks to exploit flaws in basic communication, network, and software defenses