Understanding attacker methodologies, vulnerability scanning basics, penetration testing phases (overview), and common security tools (conceptual).