# Attacking Enterprise Networks

- [External Information Gathering](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/external-information-gathering.md)
- [Service Enumeration & Exploitation](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/service-enumeration-exploitation.md)
- [Web Enumeration & Exploitation](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/web-enumeration-exploitation.md)
- [Initial Access](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/initial-access.md)
- [Post-Exploitation Persistence](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/post-exploitation-persistence.md)
- [Internal Information Gathering](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/internal-information-gathering.md)
- [Exploitation & Privilege Escalation](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/exploitation-privilege-escalation.md)
- [Lateral Movement](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/lateral-movement.md)
- [Active Directory Compromise](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/active-directory-compromise.md)
- [Post-Exploitation](/pentesting-notes/certification-preparation/cpts-prep/attacking-enterprise-networks/post-exploitation.md)
