Explore categories and drill into details.
Mental models and checklists used in real security programs.
Access control, authentication, and core security principles.
Protocols you will see in scans, traffic captures, and logs.
Common ports you will run into in scans, firewall rules, and service configs.