Name Size
Parent Directory - 1. Introduction/ - 2. Understanding the cybersecurity landscape/ - 3. Red Team Penetration, lateral movement, escalation, and exfiltration/ - 4. Blue Team Detection, Investigation, Response and Mitigation/ - 5. Beyond The Breach/ - 6. Final Exam/ -