Cyber Primer Online Learning
The course is part of this learning path
This module will introduce some of the core themes of cyber security. They are followed by two software simulations, showing how to install a hypervisor so that a Kali Linux virtual machine can be run. Kali Linux is a Linux operating system used by penetration testers.
- Cyber Security
- Prevent, Detect, Respond
- The CIA Triad
- ISMS: Information Security Management Systems
- Threat Actors
- The Cyber-Kill Chain
- Attack Surfaces
- Installing Virtualbox
- Installing Kali Linux
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
We welcome all feedback and suggestions - please contact us at firstname.lastname@example.org to let us know what you think.
In this video we're going to be installing a penetration testing operating system called, Kali Linux, built by a company called, Offensive Security. Kali Linux is a distribution of Linux , also know as a Distro and is a favorite of penetration testers. We'll use it frequently in the rest of the simulation videos. Let's make our way to their website. www.offensive-security.com. If we move over to the menu, where it says Kali and more Kali Linux downloads, we're going to be downloading a virtual image. We've already installed VirtualBox, so we will choose the VirtualBox version. As you can see, there are VMware and Hyper-V Kali Linux Box images. These are other variants of hypervisors. Feel free to investigate using them. I will select the 64 bit version. If we select that link, we'll be able to download directly from the website. It may take a bit of time to download, depending on your internet connection. That's normal, as it's quite a large file. Once the file is downloaded, we will then be moving into the VirtualBox environment and importing this image. There are a number of different virtual machines that you can download directly into VirtualBox. Mac OS, Windows 7, eight and 10 and different Linux Distros. You can even download some mobile OS images too. This is the beginning if you wish to build a personal cyber security lab. The file is now downloaded. We will proceed by selecting the Windows Start button and typing VitualBox and opening the application. Select the file menu and select import appliance. When that window is open, we will select the folder icon, that will allow us to browse the machine's folder. We can browse the my downloads folder, or whatever you have downloaded it on your computer. We will then select the actual image that we've downloaded. There it is, Kali Linux 2019. Select the open button, then select next. This will give us a description of all of the requirements for all of the settings of this machine. As well as some information about the actual image we've downloaded from Offensive Security. We'll just use the defaults and we'll select import. VirtualBox will now import this image and create this virtual machine for us. Once that is completed, our virtual machine will be there for us to use. Kali Linux is reasonably light weight. It runs on most computer system software, or hardware, therefore it is quite quick to install and import. Now that it's imported, we can see we have a Kali Linux installation on our left hand side almost ready for us to use. What we will have to do is to right click on the machine and select settings from the sub-menu. Select the USB section on the left and select USB 1.1, then you will be able to boot the machine. If you fail to do so, you may not be able to boot Kali Linux and find an error. Do make sure you select USB 1.1 and then you will be able to access your Linux machine. Now, double click on Kali Linux. When it is loaded you will need to enter the username, root. R-O-O-T. With the password, toor. T-O-O-R. And that's it. You've now taken your first steps into the world of penetration testing.
Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.