Research attack vectors and determine the detailed steps used in performing network, wireless, application-based, and cloud-specific attacks based on experimentation data.
Examples: stress testing for availability, exploit resources, tools