External sources using the public location of known vulnerabilitiesPlease purchase the course before starting the lesson.