# Cybrary

- [Offensive Penetration Testing](/cyber-with-kt/courses/cybrary/offensive-penetration-testing.md)
- [M01 : Setting the Foundation for Success](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success.md)
- [Understanding the Penetration Test Report](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/understanding-the-penetration-test-report.md)
- [Penetration Test Report Demo](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/penetration-test-report-demo.md)
- [Note Taking and Mind Mapping](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/note-taking-and-mind-mapping.md)
- [Finding Resources to Prepare for the Offensive Penetration Testing](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m01-setting-the-foundation-for-success/finding-resources-to-prepare-for-the-offensive-penetration-testing.md)
- [M02: Kali Linux Basics](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics.md)
- [Setting up the Kali Linux VM](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/setting-up-the-kali-linux-vm.md)
- [Overview of Tools in Kali Linux](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/overview-of-tools-in-kali-linux.md)
- [Understanding the Command Line](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/understanding-the-command-line.md)
- [The who, what, when, where, and how of the Linux command line](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/the-who-what-when-where-and-how-of-the-linux-command-line.md)
- [Windows Commands](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m02-kali-linux-basics/windows-commands.md)
- [M03: Understanding Network Protocols](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols.md)
- [Scanning Network Protocols](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-network-protocols.md)
- [Scanning with Nmap](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-nmap.md)
- [Scanning with Masscan](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-masscan.md)
- [Scanning with Netcat](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/scanning-with-netcat.md)
- [Using Wireshark](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/using-wireshark.md)
- [Wireshark and Encrypted Traffic](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/wireshark-and-encrypted-traffic.md)
- [Weaponizing Wireshark](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/m03-understanding-network-protocols/weaponizing-wireshark.md)
- [Important Things](/cyber-with-kt/courses/cybrary/offensive-penetration-testing/important-things.md)
