# Learn more... Get eCPPTv2

### Learn Linux

{% embed url="<https://learn-linux.popdocs.net/>" %}

{% embed url="<https://kali-linux.popdocs.net/>" %}

### Learn Windows

### Learn Networking

{% embed url="<https://learn-networking.popdocs.net/>" %}

### The 6-stage penetration testing process

1. Information gathering (enumeration)
2. Vulnerability assessment
3. Exploitation
4. Post-exploitation
5. Lateral movement
6. Proof of concept

{% @mailchimp/mailchimpSubscribe %}
