A lot of the material presented so far has been review, although it's surprisingly fun to exploit systems in a simulated industrial plant.
We've discussed a variety of topics over the last few days:
- Network Discovery
- Windows/Linux Admin
- Device exploitation (metasploit, etc.)
- Basic IDS (snort)
- Vulnerability Scanning
- Social Engineering