Security Operations V1
Exploiting
Exploiting consist of, exploiting the target machine. Simple like that.
There are tons of methods and tons of tools to exploit. It is also very depended on what you want to exploit. Check out the different related topics about exploitation.