Name Size
Parent Directory -
1. Introduction/ -
2. Understanding the cybersecurity landscape/ -
3. Red Team Penetration, lateral movement, escalation, and exfiltration/ -
4. Blue Team Detection, Investigation, Response and Mitigation/ -
5. Beyond The Breach/ -
6. Final Exam/ -