Cyber Defence:

	https://en.wikipedia.org/wiki/Proactive_cyber_defence

	https://www.ecpi.edu/blog/what-is-cyber-defense

Information Security Policies:

	https://www.sans.org/security-resources/policies/

	https://www.techopedia.com/definition/24838/information-security-policy

	https://resources.infosecinstitute.com/key-elements-information-security-policy/#gref

Vulnerability Research:

	https://github.com/sergey-pronin/Awesome-Vulnerability-Research

	https://www.sciencedirect.com/topics/computer-science/vulnerability-research

History of Linux:

	https://en.wikipedia.org/wiki/History_of_Linux

	https://www.britannica.com/technology/Linux

	https://en.wikipedia.org/wiki/Linux_distribution

Linux for pentesting:

	https://itsfoss.com/linux-hacking-penetration-testing/

Penetration Testing:

	https://searchsecurity.techtarget.com/definition/penetration-testing

	https://en.wikipedia.org/wiki/Penetration_test

	https://www.cloudflare.com/learning/security/glossary/what-is-penetration-testing/

	https://www.guru99.com/learn-penetration-testing.html

Ethical Hacking Laws and Policies:

	https://blog.ipleaders.in/laws-need-know-ethical-hacker/

	https://criminal.findlaw.com/criminal-charges/hacking-laws-and-punishments.html

	http://www.iosrjournals.org/iosr-jce/papers/Vol20-issue1/Version-1/I2001016163.pdf

IT Act 2000:

	https://indiacode.nic.in/bitstream/123456789/1999/3/A2000-21.pdf

	https://en.wikipedia.org/wiki/Information_Technology_Act,_2000

Risk Management:

	https://www.esecurityplanet.com/network-security/cybersecurity-risk-management.html

	https://www.rsa.com/en-us/discover/digital-risk-management?gclid=Cj0KCQjw6sHzBRCbARIsAF8FMpWWE5RtGAm_s5CF26m14A3rMeJ_wxHRmOJcbA40bMPS2sLkySoytNsaAkllEALw_wcB

Dual boot vs Virtual Machine:

	https://www.makeuseof.com/tag/dual-boot-vs-virtual-machine/

	https://www.quora.com/What-is-recommended-dual-boot-or-virtual-box

	https://www.reddit.com/r/Ubuntu/comments/6ezy5x/dual_boot_vs_virtual_machine/