| Number | GCKL | Getting Comfortable With Kali Linux | | ------ | ---- | ------------------------------------------------- | | 2 | GCKL | Get Comfortable With kali Linux | | 3 | CLF | Command Line Fun | | 4 | PT | Practical Tools | | 5 | BS | Bash Scripting | | 6 | PIG | Passive Information Gathering | | 7 | AIG | Active Information Gathering | | 8 | VS | Vulnerability Scanning | | 9 | WAT | Web Application Attacks | | 10 | BO | Introduction To Buffer | | 11 | WBO | Windows Buffer Overflows | | 12 | LBO | Linux Buffer Overflows | | 13 | CSA | Client-Side Attacks | | 14 | LPE | Locating Public Exploits | | 15 | FE | Fixing Exploits | | 16 | FT | File Transfers | | 17 | AE | Antivirus Evasion | | 18 | PX | Privilege Escalation | | 19 | PA | Password Attacks | | 20 | PRT | Port Redirection and Tunneling | | 21 | AD | Active Directory Attacks | | 22 | MF | The Metasploit Framework | | 23 | PE | Powershell Empire | | 24 | ATP | Assembling The Pieces: Penetration Test Breakdown |