Master Linux fundamentals for cybersecurity including command line operations, file systems, permissions, and security concepts
Hands-on exploration of the OWASP Top 10 2021 web application security risks with practical challenges and exploitation techniques
Learn passive reconnaissance techniques using WHOIS, nslookup, dig, DNSDumpster, and Shodan to gather information without direct target engagement