Layer 2 network attacks: MAC flooding to enable traffic sniffing and ARP spoofing for man-in-the-middle attacks
Complete Metasploit framework guide: exploitation, payloads, post-exploitation, and practical penetration testing scenarios
Comprehensive networking fundamentals covering OSI model, TCP/IP, subnetting, and core network security concepts