Penetration Testing
Georgia Weidman
Georgia Weidman introduces the core skills and techniques that every pentester needs. Using a virtual machine-based lab with Kali Linux, you'll run through practical lessons with tools like Wireshark, Nmap, and Burp Suite, experiencing the key stages of an actual assessment — information gathering, finding vulnerabilities, gaining access, post exploitation, and mobile hacking.
networking security backend devops intermediate practical deep-dive security networking
hands-on hands on internals under the hood