Data Structures Networking Basics CTF OSINT Basics & Working of a Web app Ports and Vulnerabilities Website Vulnerabilities Bug Bounty Methodology and steps Linux Tools SOC Digital Forensics, Incident Response and Threat Hunting Regex