user@cyber-journey:~
    _    ____ ____ _____ ____ ____  
   / \  / ___/ ___| ____/ ___/ ___| 
  / _ \| |  | |   |  _| \___ \___ \ 
 / ___ \ |__| |___| |___ ___) |__) |
/_/   \_\____\____|_____|____/____/ 
        
  ____ ____      _    _   _ _____ _____ ____  
 / ___|  _ \    / \  | \ | |_   _| ____|  _ \ 
| |  _| |_) |  / _ \ |  \| | | | |  _| | | | |
| |_| |  _ <  / ___ \| |\  | | | | |___| |_| |
 \____|_| \_\/_/   \_\_| \_| |_| |_____|____/ 
        

user@cyber-journey:~# System booting…

user@cyber-journey:~# Establishing encrypted connection…

user@cyber-journey:~# Connection secured. Identity verified.

user@cyber-journey:~# Running security protocols…

user@cyber-journey:~# Threat analysis complete. No anomalies detected.

user@cyber-journey:~# Initializing system access…

user@cyber-journey:~# **SYSTEM READY. Explore the knowledge base.**

Access the Hands-On Lab