Stepping into Security website and slides (Spring 2020)
- Intro and Kali Linux
- Reconnaissance: Information Gathering and Enumeration
- Exploitation: Frontend web attacks
- Exploitation: Backend web attacks
- Exploitation: Attacking WiFi
- Exploitation: Attacking programs
- Exploitation: Password attacks, malware, and social engineering
- Exploitation: Attacking systems with Metasploit
- Post-Exploitation: Privilege Escalation & Lateral Movement