Comprehensive coverage of the entire engagement lifecycle - Explicit inclusion of threat modeling and post-exploitation - Defined skill levels (Level 1 through Level 3) that help scope effort - Technical guidelines that complement the methodology with specific tool usage