Cyber Defence: https://en.wikipedia.org/wiki/Proactive_cyber_defence https://www.ecpi.edu/blog/what-is-cyber-defense Information Security Policies: https://www.sans.org/security-resources/policies/ https://www.techopedia.com/definition/24838/information-security-policy https://resources.infosecinstitute.com/key-elements-information-security-policy/#gref Vulnerability Research: https://github.com/sergey-pronin/Awesome-Vulnerability-Research https://www.sciencedirect.com/topics/computer-science/vulnerability-research History of Linux: https://en.wikipedia.org/wiki/History_of_Linux https://www.britannica.com/technology/Linux https://en.wikipedia.org/wiki/Linux_distribution Linux for pentesting: https://itsfoss.com/linux-hacking-penetration-testing/ Penetration Testing: https://searchsecurity.techtarget.com/definition/penetration-testing https://en.wikipedia.org/wiki/Penetration_test https://www.cloudflare.com/learning/security/glossary/what-is-penetration-testing/ https://www.guru99.com/learn-penetration-testing.html Ethical Hacking Laws and Policies: https://blog.ipleaders.in/laws-need-know-ethical-hacker/ https://criminal.findlaw.com/criminal-charges/hacking-laws-and-punishments.html http://www.iosrjournals.org/iosr-jce/papers/Vol20-issue1/Version-1/I2001016163.pdf IT Act 2000: https://indiacode.nic.in/bitstream/123456789/1999/3/A2000-21.pdf https://en.wikipedia.org/wiki/Information_Technology_Act,_2000 Risk Management: https://www.esecurityplanet.com/network-security/cybersecurity-risk-management.html https://www.rsa.com/en-us/discover/digital-risk-management?gclid=Cj0KCQjw6sHzBRCbARIsAF8FMpWWE5RtGAm_s5CF26m14A3rMeJ_wxHRmOJcbA40bMPS2sLkySoytNsaAkllEALw_wcB Dual boot vs Virtual Machine: https://www.makeuseof.com/tag/dual-boot-vs-virtual-machine/ https://www.quora.com/What-is-recommended-dual-boot-or-virtual-box https://www.reddit.com/r/Ubuntu/comments/6ezy5x/dual_boot_vs_virtual_machine/