Understanding how to exploit vulnerabilities on networks and systems, and how to maintain access to those systems.