🛡 Ethical hacking and cybersecurity🛡 Penetration testing
🛡 Basic computer knowledge
🛡 Cyber attack chain
🛡 Reconnaissance
🛡 Exploitation
🛡 Kali Linux
🛡 Namap scanning
🛡 Recon-ng scanning
🛡 Social engineering toolkit
🛡 Dark web with tor
🛡 Direct attacks for windows
🛡 Broken access control
🛡 Injection attacks