Diploma
by Abuk Dwaoseben
1. Formatting
2. TODO:
2.1. Biblography
2.2. Advanced attack example
2.3. How each attack works
3. Chapters
3.1. Introduction
3.2. Problem
3.2.1. Teaching Network Penetration
3.3. Equipment
3.3.1. Router
3.3.2. Switch
3.4. Solution
3.4.1. Environment
3.4.1.1. Description
3.4.1.2. Applications Used
3.4.1.3. Types of Attacks
3.4.1.4. Preparation
3.4.2. Instructions
3.4.2.1. Introduction
3.4.2.2. Attack
3.4.2.3. Defense