Introduction and Planning
  • Introduction and Lab Planning
  • Environment Preparation
Reconnaissance, Enumeration and Exploitation
  • Reconnaissance
  • Service Scanning with NMAP
  • Vulnerability Scanning and Exploitation - Part 1
  • Vulnerability Scanning and Exploitation - Part 2
Post-Exploitation and Red Teaming
  • Post-Exploitation and Red Teaming using Empire3 and Cobalt Strike
  • Where to go from here?
  • Egress