diff --git a/security/modules/lessons/nav.adoc b/security/modules/lessons/nav.adoc
index defff10189ff1e981c0a4fc83036e93e7a1b94b8..c2b4576be00f4fab49434b06cb2da07a3b35c09b 100644
--- a/security/modules/lessons/nav.adoc
+++ b/security/modules/lessons/nav.adoc
@@ -1,30 +1,30 @@
 * Lesson 1: Penetration Testing
 ** xref:lesson-1-pentest_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/01-pentesting-overview.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/01-pentesting-overview.html?job=genpdf[slides]
 * Lesson 2: Reconnaissance
 ** xref:lesson-2-recon_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/02-network-scanning-and-recon.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/-/jobs/artifacts/master/file/slides/02-network-scanning-and-recon.html?job=genpdf[slides]
 * Lesson 3: Exploit Research 
 ** xref:lesson-3-research_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/03-exploitation-research-slides.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/03-exploitation-research-slides.html?job=genpdf[slides]
 * Lesson 4: Web Exploitation-XSS 
 ** xref:lesson-4-xss_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/04-web-exploitation.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/04-web-exploitation.html?job=genpdf[slides]
 * Lesson 5: Web Exploitation-SQL 
 ** xref:lesson-5-sql_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/05-sql-injection-slides.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/05-sql-injection-slides.html?job=genpdf[slides]
 * Lesson 6: Reverse Engineering
 ** xref:lesson-6-reverse_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/06-reverse-engineering.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/06-reverse-engineering.html?job=genpdf[slides]
 * Lesson 7: Exploit Development Testing
 ** xref:lesson-7-exploit_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/07-exploit-development.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/07-exploit-development.html?job=genpdf[slides]
 * Lesson 8: Post Exploitation
 ** xref:lesson-8-post_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/08-post-exploitation.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/08-post-exploitation.html?job=genpdf[slides]
 * Lesson 9: Windows-exploitation
 ** xref:lesson-9-windows-exploit_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/09-windows-priv-persist-cover.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/09-windows-priv-persist-cover.html?job=genpdf[slides]
 * Lesson 10: Linux-exploitation
 ** xref:lesson-10-linux-exploit_sg.adoc[Student Guide]
-** xref:https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/10-linux-priv-persist-cover.html?job=genpdf[slides]
+** https://git.cybbh.space/sec/public/builds/artifacts/master/file/slides/10-linux-priv-persist-cover.html?job=genpdf[slides]