CEHv6 module 33 reverse engineering techniques
LPTv4 module 17 vulnerability analysis
LPTv4 module 27 stolen laptop, PDAs and cell phones penetration testing
LPTv4 module 29 physical security penetration testing
LPTv4 module 30 database penetration testing
LPTv4 module 32 VPN penetration testing
LPTv4 module 33 wardialing
LPTv4 module 34 virus and trojan detection
LPTv4 module 35 log management penetration testing
LPTv4 module 36 file integrity checking
LPTv4 module 37 blue tooth and hand held device penetration testing formatted
LPTv4 module 38 telecommunication and broadband communication penetration testing
LPTv4 module 39 email security penetration testing