# Courses

- [TCM](/cyber-with-kt/courses/tcm.md)
- [Practical Ethical Hacking (TCM)](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm.md)
- [Intro](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro.md)
- [Technical Skills Needed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro/technical-skills-needed.md)
- [Soft Skills Needed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro/soft-skills-needed.md)
- [Networking Refresher](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher.md)
- [IP Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/ip-addresses.md)
- [MAC Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/mac-addresses.md)
- [TCP, UDP, and the Three-Way Handshake](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/tcp-udp-and-the-three-way-handshake.md)
- [Common Ports and Protocols](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/common-ports-and-protocols.md)
- [The OSI Model](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/the-osi-model.md)
- [Subnetting](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/subnetting.md)
- [Setting Up Our Lab](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/setting-up-our-lab.md)
- [Configuring VirtualBox](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/setting-up-our-lab/configuring-virtualbox.md)
- [Introduction to Linux](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux.md)
- [Sudo Overview](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/sudo-overview.md)
- [Navigating the File System](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/navigating-the-file-system.md)
- [Users and Privileges](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/users-and-privileges.md)
- [Common Network Commands](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/common-network-commands.md)
- [Installing and Updating Tools](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/installing-and-updating-tools.md)
- [Installing gedit](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/installing-gedit.md)
- [Viewing, Creating, and Editing Files](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/viewing-creating-and-editing-files.md)
- [Scripting with Bash](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/scripting-with-bash.md)
- [Starting and Stopping Services](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/starting-and-stopping-services.md)
- [Introduction to Python](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python.md)
- [Strings](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/strings.md)
- [Maths](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/maths.md)
- [Variables and Methods](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/variables-and-methods.md)
- [Functions](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/functions.md)
- [Boolean Expressions](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/boolean-expressions.md)
- [Relational and Boolean Operators](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/relational-and-boolean-operators.md)
- [Conditional Statements](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/conditional-statements.md)
- [List](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/list.md)
- [Information Gathering (Reconnaissance)](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance.md)
- [Passive Reconnaissance](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/passive-reconnaissance.md)
- [Identifying Our Target](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/identifying-our-target.md)
- [Discovering Email Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/discovering-email-addresses.md)
- [Hunting Breached Credentials with DeHashed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-breached-credentials-with-dehashed.md)
- [Hunting Subdomains Part 1](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-subdomains-part-1.md)
- [Hunting Subdomains Part 2](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-subdomains-part-2.md)
- [Identifying Website Technologies](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/identifying-website-technologies.md)
- [Information Gathering with Burp Suite](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/information-gathering-with-burp-suite.md)
- [Google Fu](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/google-fu.md)
- [Utilizing Social Media](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/utilizing-social-media.md)
- [Scanning & Enumeration](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration.md)
- [Installing Kioptrix](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/installing-kioptrix.md)
- [Scanning with Nmap](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/scanning-with-nmap.md)
- [Enumerating HTTP and HTTPS I](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-http-and-https-i.md)
- [Enumerating HTTP and HTTPS II](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-http-and-https-ii.md)
- [Enumerating SMB](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-smb.md)
- [Enumerating SSH](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-ssh.md)
- [Researching Potential Vulnerabilities](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/researching-potential-vulnerabilities.md)
- [Vulnerabilities](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/researching-potential-vulnerabilities/vulnerabilities.md)
- [Vulnerability Scanning with Nessus](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/vulnerability-scanning-with-nessus.md)
- [Scanning with Nessus Part 1](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/vulnerability-scanning-with-nessus/scanning-with-nessus-part-1.md)
- [Exploitation Basics](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics.md)
- [Reverse Shells vs Bind Shells](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics/reverse-shells-vs-bind-shells.md)
- [Staged vs Non-Staged Payloads](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics/staged-vs-non-staged-payloads.md)
- [Practical Security Fundamentals](/cyber-with-kt/courses/tcm/practical-security-fundamentals.md)
- [1. Security Basics](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics.md)
- [Why Security Matters](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/why-security-matters.md)
- [The Business of Cybercrime](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/the-business-of-cybercrime.md)
- [The CIA Triad](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/the-cia-triad.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/check-in-quiz.md)
- [2. Intro to the Blue Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team.md)
- [Who is the Blue Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/who-is-the-blue-team.md)
- [The SOC](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/the-soc.md)
- [The SOC Analyst](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/the-soc-analyst.md)
- [Other Blue Team Roles](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/other-blue-team-roles.md)
- [TCM Blue Team Roadmap](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/tcm-blue-team-roadmap.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/check-in-quiz.md)
- [3. Intro to the Red Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team.md)
- [Who is the Red Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/who-is-the-red-team.md)
- [What is a Penetration Test/Tester](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/what-is-a-penetration-test-tester.md)
- [Other Red Team Roles](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/other-red-team-roles.md)
- [🖥️Red Team Hands-On Lab Part 1](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/red-team-hands-on-lab-part-1.md)
- [🖥️Red Team Hands-On Lab Part 2](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/red-team-hands-on-lab-part-2.md)
- [TCM Red Team Roadmaps](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/tcm-red-team-roadmaps.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/check-in-quiz.md)
- [4. Defensive Tooling](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling.md)
- [Section Intro & Vendor Neutrality](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/section-intro-and-vendor-neutrality.md)
- [Firewalls](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/firewalls.md)
- [🖥️Firewall Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/firewall-lab.md)
- [IDS & IPS](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/ids-and-ips.md)
- [Endpoint Protection (AV)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/endpoint-protection-av.md)
- [🖥️Signature Based Detection Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/signature-based-detection-lab.md)
- [Endpoint Protection (EDR)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/endpoint-protection-edr.md)
- [SIEM](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/siem.md)
- [Defense In-Depth](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/defense-in-depth.md)
- [Confusion Matrix](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/confusion-matrix.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/check-in-quiz.md)
- [5. Vulnerabilities and Exploits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits.md)
- [Vulnerabilities Vs Exploits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/vulnerabilities-vs-exploits.md)
- [🖥️Exploit Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/exploit-lab.md)
- [CVE, CVSS, CWE](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/cve-cvss-cwe.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/check-in-quiz.md)
- [6. Intro to Threats and Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks.md)
- [Threat Actors and Groups](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/threat-actors-and-groups.md)
- [Network Based Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/network-based-attacks.md)
- [🖥️Packet Sniffing Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/packet-sniffing-lab.md)
- [Wireless Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/wireless-attacks.md)
- [Supply-Chain Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/supply-chain-attacks.md)
- [Physical Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/physical-attacks.md)
- [Mitre ATT\&CK and Lockheed Martin Killchain](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/mitre-att-and-ck-and-lockheed-martin-killchain.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/check-in-quiz.md)
- [7. Social Engineering](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering.md)
- [Intro to Social Engineering](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/intro-to-social-engineering.md)
- [Phishing](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/phishing.md)
- [Tailgating and Impersonation](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/tailgating-and-impersonation.md)
- [Social Engineering Defenses](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/social-engineering-defenses.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/check-in-quiz.md)
- [8. Malware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware.md)
- [What is Malware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/what-is-malware.md)
- [Viruses, Worms, and Trojans](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/viruses-worms-and-trojans.md)
- [Ransomware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/ransomware.md)
- [Spyware and Keyloggers](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/spyware-and-keyloggers.md)
- [Rootkits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/rootkits.md)
- [Maldocs](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/maldocs.md)
- [🖥️Static Malware Analysis Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/static-malware-analysis-lab.md)
- [Additional Malware Terminology](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/additional-malware-terminology.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/check-in-quiz.md)
- [9. Cryptography](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography.md)
- [What is Cryptography](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/what-is-cryptography.md)
- [Encryption](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/encryption.md)
- [Hashing and Digital Signatures](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/hashing-and-digital-signatures.md)
- [Common Cryptographic Algorithms](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/common-cryptographic-algorithms.md)
- [🖥️CyberChef Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/cyberchef-lab.md)
- [Certificates and Public Key Infrastructure](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/certificates-and-public-key-infrastructure.md)
- [HTTPS, TLS and SSL](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/https-tls-and-ssl.md)
- [Common Cryptographic Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/common-cryptographic-attacks.md)
- [🖥️Hashcat Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/hashcat-lab.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/check-in-quiz.md)
- [10. Authentication, Authorization and Accounting (AAA)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa.md)
- [What is AAA?](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/what-is-aaa.md)
- [Least Privilege](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/least-privilege.md)
- [IAM](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/iam.md)
- [SSO and MFA](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/sso-and-mfa.md)
- [🖥️Linux AAA Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/linux-aaa-lab.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/check-in-quiz.md)
- [11. Security Frameworks, Standards and Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations.md)
- [What are Security Frameworks, Standards and Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/what-are-security-frameworks-standards-and-regulations.md)
- [Risks and Control](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/risks-and-control.md)
- [Popular Security Frameworks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/popular-security-frameworks.md)
- [Important Security Standards](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/important-security-standards.md)
- [Important Security Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/important-security-regulations.md)
- [GRC](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/grc.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/check-in-quiz.md)
- [12. Digital Forensics and Incident Response](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response.md)
- [What is a Breach?](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/what-is-a-breach.md)
- [Incident Response](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/incident-response.md)
- [Indicators of Compromise](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/indicators-of-compromise.md)
- [Events vs Incidents](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/events-vs-incidents.md)
- [Digital Forensics](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/digital-forensics.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/check-in-quiz.md)
- [Cybrary](/cyber-with-kt/courses/cybrary.md)
- [Offensive Penetration Testing](/cyber-with-kt/courses/cybrary/offensive-penetration-testing.md)
- [M01 : Setting the Foundation for Success](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success.md)
- [Understanding the Penetration Test Report](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/understanding-the-penetration-test-report.md)
- [Penetration Test Report Demo](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/penetration-test-report-demo.md)
- [Note Taking and Mind Mapping](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/note-taking-and-mind-mapping.md)
- [Finding Resources to Prepare for the Offensive Penetration Testing](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/finding-resources-to-prepare-for-the-offensive-penetration-testing.md)
- [M02: Kali Linux Basics](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics.md)
- [Setting up the Kali Linux VM](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/setting-up-the-kali-linux-vm.md)
- [Overview of Tools in Kali Linux](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/overview-of-tools-in-kali-linux.md)
- [Understanding the Command Line](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/understanding-the-command-line.md)
- [The who, what, when, where, and how of the Linux command line](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/the-who-what-when-where-and-how-of-the-linux-command-line.md)
- [Windows Commands](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/windows-commands.md)
- [M03: Understanding Network Protocols](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols.md)
- [Scanning Network Protocols](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-network-protocols.md)
- [Scanning with Nmap](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-nmap.md)
- [Scanning with Masscan](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-masscan.md)
- [Scanning with Netcat](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-netcat.md)
- [Using Wireshark](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/using-wireshark.md)
- [Wireshark and Encrypted Traffic](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/wireshark-and-encrypted-traffic.md)
- [Weaponizing Wireshark](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/weaponizing-wireshark.md)
- [Important Things](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/important-things.md)
- [HackingLK](/cyber-with-kt/courses/hackinglk.md)
- [Web Application Hacking Advance](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance.md)
- [Web Information Gathering](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/web-information-gathering.md)
- [Web Information Gathering - Netcraft](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/web-information-gathering-netcraft.md)
- [Web Information Gathering - Subdomain Scan](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/web-information-gathering-subdomain-scan.md)
- [Scan Hidden Web Directories - Dirb Tool - I](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/scan-hidden-web-directories-dirb-tool-i.md)
- [Scan Hidden Web Directories - Dirb Tool - II](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/scan-hidden-web-directories-dirb-tool-ii.md)
- [Basic of File Upload Vulnerbilities](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/basic-of-file-upload-vulnerbilities.md)
- [How to setup Burp Suite & Proxy](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/how-to-setup-burp-suite-and-proxy.md)
- [Mid Security File Upload Vulnerbilities](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/mid-security-file-upload-vulnerbilities.md)
- [Advance Security File Upload Vulnerbilities](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/advance-security-file-upload-vulnerbilities.md)
- [Fix File Upload Vulnerabiity](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/fix-file-upload-vulnerabiity.md)
- [Code Execution Vulnerability - I](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/code-execution-vulnerability-i.md)
- [Mid,Advanced Security Code Execution Vulnerabilities Exploit](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/mid-advanced-security-code-execution-vulnerabilities-exploit.md)
- [Fix Code Execution Vulnerabilities](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/fix-code-execution-vulnerabilities.md)
- [SQL Injections & SQL database Explore](/cyber-with-kt/courses/hackinglk/web-application-hacking-advance/sql-injections-and-sql-database-explore.md)
- [Hackviser](/cyber-with-kt/courses/hackviser.md)
- [Certified Associate Penetration Tester](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester.md)
- [Practicals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/practicals.md)
- [Linux Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/practicals/linux-fundamentals.md)
- [Windows Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/practicals/windows-fundamentals.md)
- [Using Windows Command Line](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/practicals/using-windows-command-line.md)
- [1. Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction.md)
- [Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/introduction.md)
- [Hacker](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/hacker.md)
- [Sub-Fields of Cybersecurity](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/sub-fields-of-cybersecurity.md)
- [Career](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/career.md)
- [Penetration Testing (Pentest)](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/penetration-testing-pentest.md)
- [Basic Information](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/basic-information.md)
- [Resources](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/resources.md)
- [Explore Hackviser](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/1.-introduction/explore-hackviser.md)
- [2. Operating Systems Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals.md)
- [Linux Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals.md)
- [Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/introduction.md)
- [Linux Distributions](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/linux-distributions.md)
- [Linux Shell](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/linux-shell.md)
- [Navigating Directories](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/navigating-directories.md)
- [File and Directory Operations](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/file-and-directory-operations.md)
- [Methods of Finding Files and Directories in Linux](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/methods-of-finding-files-and-directories-in-linux.md)
- [Text Editing](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/text-editing.md)
- [Filters](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/filters.md)
- [Package Management](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/package-management.md)
- [User Management](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/user-management.md)
- [Group Management](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/group-management.md)
- [Permissions](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/permissions.md)
- [Process Management](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/process-management.md)
- [Network Management](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/network-management.md)
- [Exam](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/linux-fundamentals/exam.md)
- [Windows Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals.md)
- [Windows Architecture](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/windows-architecture.md)
- [Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/introduction.md)
- [Services and Processes in Windows](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/services-and-processes-in-windows.md)
- [Configuring Windows](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/configuring-windows.md)
- [Command Line Interface (CLI)](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/command-line-interface-cli.md)
- [Ensuring Device Security](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/ensuring-device-security.md)
- [Ensuring Windows Security](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/windows-fundamentals/ensuring-windows-security.md)
- [Using Windows Command Line](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line.md)
- [Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/introduction.md)
- [PowerShell Installation](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/powershell-installation.md)
- [Introduction to CMD](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/introduction-to-cmd.md)
- [Introduction to PowerShell](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/introduction-to-powershell.md)
- [Basic Usage](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/basic-usage.md)
- [User Management with PowerShell](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/user-management-with-powershell.md)
- [PowerShell and Network Connections](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/powershell-and-network-connections.md)
- [Retrieving Information](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/retrieving-information.md)
- [PowerShell Scripting](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/2.-operating-systems-fundamentals/using-windows-command-line/powershell-scripting.md)
- [3. Cryptology Fundamentals](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals.md)
- [Introduction](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/introduction.md)
- [Cryptography and Cryptanalysis](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/cryptography-and-cryptanalysis.md)
- [Symmetric Encryption](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/symmetric-encryption.md)
- [Asymmetric Encryption](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/asymmetric-encryption.md)
- [Hash Functions and Hash Algorithms](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/hash-functions-and-hash-algorithms.md)
- [Digital Signatures](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/digital-signatures.md)
- [Cryptographic Protocols](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/cryptographic-protocols.md)
- [Cryptanalysis Techniques](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/cryptanalysis-techniques.md)
- [Labs](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs.md)
- [Encoding Techniques](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques.md)
- [ASCII](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/ascii.md)
- [Base64](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/base64.md)
- [URL Encoding](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/url-encoding.md)
- [Hex Encoding](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/hex-encoding.md)
- [Binary](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/binary.md)
- [Base32](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/base32.md)
- [Quoted-printable](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/quoted-printable.md)
- [HTML Character Entities](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/html-character-entities.md)
- [Uuencoding](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/encoding-techniques/uuencoding.md)
- [Hashing Techniques](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/hashing-techniques.md)
- [MD5](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/hashing-techniques/md5.md)
- [SHA1](/cyber-with-kt/courses/hackviser/certified-associate-penetration-tester/3.-cryptology-fundamentals/labs/hashing-techniques/sha1.md)
- [CWL](/cyber-with-kt/courses/cwl.md)
- [MCRTA](/cyber-with-kt/courses/cwl/mcrta.md)
- [AWS Cloud Red Teaming](/cyber-with-kt/courses/cwl/mcrta/aws-cloud-red-teaming.md)
