Lesson 1Identifying VulnerabilitiesLearn to identify common vulnerabilities in systems.Start2 Micro-lessonsMicro lesson 1Common VulnerabilitiesMicro lesson 2Vulnerability Scanning
Lesson 2Exploiting WeaknessesUnderstand how vulnerabilities are exploited by attackers.Start2 Micro-lessonsMicro lesson 1Exploitation TechniquesMicro lesson 2Real-World Exploits
Lesson 3Protecting SystemsLearn strategies to protect systems from vulnerabilities.Start2 Micro-lessonsMicro lesson 1System HardeningMicro lesson 2Security Best Practices