Lesson 2: Network Attack Agenda * Network Attack * Nmap * Enumeration * Metasploit * Jenkins * JBoss * Lateral Movement * Lab 2 Lab #2 * Enumeration * Exploiting Jenkins Manually * Introducing Metasploit * Exploiting Jenkins with Metasploit * Pivot/Penetrate Resources Introduction to AWS Security Overview of Security Processes