Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
79
Finally, we will complete the summary section as we review our notes. To continue the example,
we might write “hashing a password = additional protection. Interested in more about cracking.”
The content here does not need to necessarily be directly related to the material - this is an
opportunity to reflect on our own interest, knowledge, and the study experience itself as well.
Later in this Module, we will explore how self-reflection can be helpful.
4.5.2
Retrieval Practice
Yüklə
Dostları ilə paylaş: