Previous Lecture Complete and continue  

  1.5 Exploring Penetration Testing and other Cyber Security Certifications