I will provide your firm or organization with the necessary PT skills required to make sure whether or not your systems are vulnarable to public attacks. I must specify that not all systems will give output of weak and exploitable systems but in the course of the PT, I will make note of all open ports and vulnerabilities that are discovered including ones that are outside of the specified scope.