Resources

Virtual Machines

Lecture Slides

# Topic
1 Welcome & Introduction
2 Penetration Testing: Overview
3 Penetration Testing: Reconnaissance