STUFF FROM DAY 1
Example of a Conceptual Design Diagram
Example of a Logical Design Diagram

Example of a Physical Design Diagram
Spectre (security vulnerability)
Meltdown (security vulnerability)
The Basics of Arpspoofing/Arppoisoning
Cisco Guide to Harden Cisco IOS Devices
Best Wireless Adapter For Hacking in Kali Linux (2020 Review)
STUFF FROM DAY 2
The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps
The Phoenix Project: A Novel about IT, DevOps, and Helping Your Business Win
Hash Crack: Password Cracking Manual (v2.0) 2nd Edition
Estimating Password Cracking Times
Google Hacking Database (GHDB)
STUFF FROM DAY 3
STUFF FROM DAY 4
Kryptos — Central Intelligence Agency
A (relatively easy to understand) primer on elliptic curve cryptography
STUFF FROM DAY 5
https://github.com/p0w3rsh3ll/SEC505
Most popular Google Hacking Techniques – Top Google Dorks and Hacks
Extracting Password Hashes from the Ntds.dit File