From 5cb32616c74d5eacf60c9c580ccdcc782fe54be1 Mon Sep 17 00:00:00 2001 From: Joe Shenouda Date: Wed, 4 Jan 2017 13:26:40 +0100 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 1bb9067..40d23c0 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # awesome-cyber-skills **A curated list of hacking environments where you can train your cyber skills legally and safely** -!(https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAAg_AAAAJDE0NmI0OGMzLTcyYTUtNGJhMS1iZjM4LWRmYzEwODM0ZWFhNg.jpg) +![](https://media.licdn.com/mpr/mpr/AAEAAQAAAAAAAAg_AAAAJDE0NmI0OGMzLTcyYTUtNGJhMS1iZjM4LWRmYzEwODM0ZWFhNg.jpg) For everyone in the Information Security business, it's important to understand the enemy, the hacker. Understanding the enemy makes you the best defender you can be to secure the digital world.