PEN-200
Information Gathering
Vulnerability Scanning
Introduction to Web Application Attacks
Common Web Application Attacks
SQL Injection Attacks
Client-side Attacks
Locating Public Exploits
Fixing Exploits
Antivirus Evasion
Password Attacks
Windows Privilege Escalation
Linux Privilege Escalation
Port Redirection and SSH Tunneling
Tunneling Through Deep Packet Inspection
The Metasploit Framework
Active Directory Introduction and Enumeration
Attacking Active Directory Authentication
Lateral Movement in Active Directory
Assembling the Pieces