2.3.1 Getting Started: Optional Ramp-up Modules
2.3.2 Enumeration and Information Gathering
2.3.3 Web Application and Client Side Attacks
2.3.4 Other Perimeter Attacks
2.3.5 Privilege Escalation and Lateral Movement
2.3.6 Active Directory
2.3.7 Challenge Lab Preparation
2.4 Wrapping Up