Cyber With KT
Ctrlk
  • About Me
  • ๐Ÿ—ƒ๏ธCourses
    • TCM
    • Cybrary
      • Offensive Penetration Testing
        • M01 : Setting the Foundation for Success
        • M02: Kali Linux Basics
          • Setting up the Kali Linux VM
          • Overview of Tools in Kali Linux
          • Understanding the Command Line
          • The who, what, when, where, and how of the Linux command line
          • Windows Commands
        • M03: Understanding Network Protocols
        • Important Things
    • HackingLK
    • Hackviser
    • CWL
  • ๐Ÿ“šConcepts
  • ๐ŸChallenges/CTFs
  • ๐ŸšฉWalkthrough/Writeups
  • ๐Ÿ› ๏ธTools & Commands
  • ๐Ÿ’ŽProjects
  • ๐Ÿ“ฑContent Creation
  • ๐Ÿ“Cheat Sheets
  • ๐Ÿ”OSINT Tools & Notes
  • ๐ŸžBug Bounty
  • ๐Ÿ’กResearch & Experiments
  • Templates & Reporting
  • Interview & Certification Prep
Powered by GitBook
On this page
  1. ๐Ÿ—ƒ๏ธCourses
  2. Cybrary
  3. Offensive Penetration Testing

M02: Kali Linux Basics

Setting up the Kali Linux VMOverview of Tools in Kali LinuxUnderstanding the Command LineThe who, what, when, where, and how of the Linux command lineWindows Commands
PreviousFinding Resources to Prepare for the Offensive Penetration TestingNextSetting up the Kali Linux VM