# TCM

- [Practical Ethical Hacking (TCM)](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm.md)
- [Intro](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro.md)
- [Technical Skills Needed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro/technical-skills-needed.md)
- [Soft Skills Needed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/intro/soft-skills-needed.md)
- [Networking Refresher](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher.md)
- [IP Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/ip-addresses.md)
- [MAC Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/mac-addresses.md)
- [TCP, UDP, and the Three-Way Handshake](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/tcp-udp-and-the-three-way-handshake.md)
- [Common Ports and Protocols](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/common-ports-and-protocols.md)
- [The OSI Model](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/the-osi-model.md)
- [Subnetting](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/networking-refresher/subnetting.md)
- [Setting Up Our Lab](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/setting-up-our-lab.md)
- [Configuring VirtualBox](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/setting-up-our-lab/configuring-virtualbox.md)
- [Introduction to Linux](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux.md)
- [Sudo Overview](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/sudo-overview.md)
- [Navigating the File System](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/navigating-the-file-system.md)
- [Users and Privileges](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/users-and-privileges.md)
- [Common Network Commands](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/common-network-commands.md)
- [Installing and Updating Tools](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/installing-and-updating-tools.md)
- [Installing gedit](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/installing-gedit.md)
- [Viewing, Creating, and Editing Files](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/viewing-creating-and-editing-files.md)
- [Scripting with Bash](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/scripting-with-bash.md)
- [Starting and Stopping Services](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-linux/starting-and-stopping-services.md)
- [Introduction to Python](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python.md)
- [Strings](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/strings.md)
- [Maths](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/maths.md)
- [Variables and Methods](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/variables-and-methods.md)
- [Functions](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/functions.md)
- [Boolean Expressions](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/boolean-expressions.md)
- [Relational and Boolean Operators](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/relational-and-boolean-operators.md)
- [Conditional Statements](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/conditional-statements.md)
- [List](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/introduction-to-python/list.md)
- [Information Gathering (Reconnaissance)](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance.md)
- [Passive Reconnaissance](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/passive-reconnaissance.md)
- [Identifying Our Target](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/identifying-our-target.md)
- [Discovering Email Addresses](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/discovering-email-addresses.md)
- [Hunting Breached Credentials with DeHashed](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-breached-credentials-with-dehashed.md)
- [Hunting Subdomains Part 1](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-subdomains-part-1.md)
- [Hunting Subdomains Part 2](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/hunting-subdomains-part-2.md)
- [Identifying Website Technologies](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/identifying-website-technologies.md)
- [Information Gathering with Burp Suite](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/information-gathering-with-burp-suite.md)
- [Google Fu](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/google-fu.md)
- [Utilizing Social Media](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/information-gathering-reconnaissance/utilizing-social-media.md)
- [Scanning & Enumeration](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration.md)
- [Installing Kioptrix](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/installing-kioptrix.md)
- [Scanning with Nmap](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/scanning-with-nmap.md)
- [Enumerating HTTP and HTTPS I](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-http-and-https-i.md)
- [Enumerating HTTP and HTTPS II](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-http-and-https-ii.md)
- [Enumerating SMB](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-smb.md)
- [Enumerating SSH](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/enumerating-ssh.md)
- [Researching Potential Vulnerabilities](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/researching-potential-vulnerabilities.md)
- [Vulnerabilities](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/scanning-and-enumeration/researching-potential-vulnerabilities/vulnerabilities.md)
- [Vulnerability Scanning with Nessus](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/vulnerability-scanning-with-nessus.md)
- [Scanning with Nessus Part 1](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/vulnerability-scanning-with-nessus/scanning-with-nessus-part-1.md)
- [Exploitation Basics](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics.md)
- [Reverse Shells vs Bind Shells](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics/reverse-shells-vs-bind-shells.md)
- [Staged vs Non-Staged Payloads](/cyber-with-kt/courses/tcm/practical-ethical-hacking-tcm/exploitation-basics/staged-vs-non-staged-payloads.md)
- [Practical Security Fundamentals](/cyber-with-kt/courses/tcm/practical-security-fundamentals.md)
- [1. Security Basics](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics.md)
- [Why Security Matters](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/why-security-matters.md)
- [The Business of Cybercrime](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/the-business-of-cybercrime.md)
- [The CIA Triad](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/the-cia-triad.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/1.-security-basics/check-in-quiz.md)
- [2. Intro to the Blue Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team.md)
- [Who is the Blue Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/who-is-the-blue-team.md)
- [The SOC](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/the-soc.md)
- [The SOC Analyst](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/the-soc-analyst.md)
- [Other Blue Team Roles](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/other-blue-team-roles.md)
- [TCM Blue Team Roadmap](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/tcm-blue-team-roadmap.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/2.-intro-to-the-blue-team/check-in-quiz.md)
- [3. Intro to the Red Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team.md)
- [Who is the Red Team](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/who-is-the-red-team.md)
- [What is a Penetration Test/Tester](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/what-is-a-penetration-test-tester.md)
- [Other Red Team Roles](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/other-red-team-roles.md)
- [🖥️Red Team Hands-On Lab Part 1](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/red-team-hands-on-lab-part-1.md)
- [🖥️Red Team Hands-On Lab Part 2](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/red-team-hands-on-lab-part-2.md)
- [TCM Red Team Roadmaps](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/tcm-red-team-roadmaps.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/3.-intro-to-the-red-team/check-in-quiz.md)
- [4. Defensive Tooling](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling.md)
- [Section Intro & Vendor Neutrality](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/section-intro-and-vendor-neutrality.md)
- [Firewalls](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/firewalls.md)
- [🖥️Firewall Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/firewall-lab.md)
- [IDS & IPS](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/ids-and-ips.md)
- [Endpoint Protection (AV)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/endpoint-protection-av.md)
- [🖥️Signature Based Detection Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/signature-based-detection-lab.md)
- [Endpoint Protection (EDR)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/endpoint-protection-edr.md)
- [SIEM](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/siem.md)
- [Defense In-Depth](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/defense-in-depth.md)
- [Confusion Matrix](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/confusion-matrix.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/4.-defensive-tooling/check-in-quiz.md)
- [5. Vulnerabilities and Exploits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits.md)
- [Vulnerabilities Vs Exploits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/vulnerabilities-vs-exploits.md)
- [🖥️Exploit Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/exploit-lab.md)
- [CVE, CVSS, CWE](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/cve-cvss-cwe.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/5.-vulnerabilities-and-exploits/check-in-quiz.md)
- [6. Intro to Threats and Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks.md)
- [Threat Actors and Groups](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/threat-actors-and-groups.md)
- [Network Based Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/network-based-attacks.md)
- [🖥️Packet Sniffing Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/packet-sniffing-lab.md)
- [Wireless Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/wireless-attacks.md)
- [Supply-Chain Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/supply-chain-attacks.md)
- [Physical Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/physical-attacks.md)
- [Mitre ATT\&CK and Lockheed Martin Killchain](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/mitre-att-and-ck-and-lockheed-martin-killchain.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/6.-intro-to-threats-and-attacks/check-in-quiz.md)
- [7. Social Engineering](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering.md)
- [Intro to Social Engineering](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/intro-to-social-engineering.md)
- [Phishing](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/phishing.md)
- [Tailgating and Impersonation](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/tailgating-and-impersonation.md)
- [Social Engineering Defenses](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/social-engineering-defenses.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/7.-social-engineering/check-in-quiz.md)
- [8. Malware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware.md)
- [What is Malware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/what-is-malware.md)
- [Viruses, Worms, and Trojans](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/viruses-worms-and-trojans.md)
- [Ransomware](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/ransomware.md)
- [Spyware and Keyloggers](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/spyware-and-keyloggers.md)
- [Rootkits](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/rootkits.md)
- [Maldocs](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/maldocs.md)
- [🖥️Static Malware Analysis Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/static-malware-analysis-lab.md)
- [Additional Malware Terminology](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/additional-malware-terminology.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/8.-malware/check-in-quiz.md)
- [9. Cryptography](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography.md)
- [What is Cryptography](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/what-is-cryptography.md)
- [Encryption](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/encryption.md)
- [Hashing and Digital Signatures](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/hashing-and-digital-signatures.md)
- [Common Cryptographic Algorithms](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/common-cryptographic-algorithms.md)
- [🖥️CyberChef Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/cyberchef-lab.md)
- [Certificates and Public Key Infrastructure](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/certificates-and-public-key-infrastructure.md)
- [HTTPS, TLS and SSL](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/https-tls-and-ssl.md)
- [Common Cryptographic Attacks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/common-cryptographic-attacks.md)
- [🖥️Hashcat Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/hashcat-lab.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/9.-cryptography/check-in-quiz.md)
- [10. Authentication, Authorization and Accounting (AAA)](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa.md)
- [What is AAA?](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/what-is-aaa.md)
- [Least Privilege](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/least-privilege.md)
- [IAM](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/iam.md)
- [SSO and MFA](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/sso-and-mfa.md)
- [🖥️Linux AAA Lab](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/linux-aaa-lab.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/10.-authentication-authorization-and-accounting-aaa/check-in-quiz.md)
- [11. Security Frameworks, Standards and Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations.md)
- [What are Security Frameworks, Standards and Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/what-are-security-frameworks-standards-and-regulations.md)
- [Risks and Control](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/risks-and-control.md)
- [Popular Security Frameworks](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/popular-security-frameworks.md)
- [Important Security Standards](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/important-security-standards.md)
- [Important Security Regulations](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/important-security-regulations.md)
- [GRC](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/grc.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/11.-security-frameworks-standards-and-regulations/check-in-quiz.md)
- [12. Digital Forensics and Incident Response](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response.md)
- [What is a Breach?](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/what-is-a-breach.md)
- [Incident Response](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/incident-response.md)
- [Indicators of Compromise](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/indicators-of-compromise.md)
- [Events vs Incidents](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/events-vs-incidents.md)
- [Digital Forensics](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/digital-forensics.md)
- [✏️Check-In Quiz](/cyber-with-kt/courses/tcm/practical-security-fundamentals/12.-digital-forensics-and-incident-response/check-in-quiz.md)
