I agree, it would be very interesting to have a write-up on the subject to understand the level of complexity that one is going to face. Someone who has already gone through the certification... Are the machines to be exploited different or always the same?