Ethical hacking

 Description Describe 8 methods of penetration testing. Discuss a minimum of two network analyzers. Include the latest cyler threats