Previous Lecture Complete and continue  

  1.2 Getting Started with Ethical Hacking and Pen Testing