Cyber Primer Online Learning
The course is part of this learning path
This module will introduce some of the core themes of cyber security. They are followed by two software simulations, showing how to install a hypervisor so that a Kali Linux virtual machine can be run. Kali Linux is a Linux operating system used by penetration testers.
- Cyber Security
- Prevent, Detect, Respond
- The CIA Triad
- ISMS: Information Security Management Systems
- Threat Actors
- The Cyber-Kill Chain
- Attack Surfaces
- Installing Virtualbox
- Installing Kali Linux
Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.
There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.
We welcome all feedback and suggestions - please contact us at email@example.com to let us know what you think.
In this video we're going install the VirtualBox software package. VirtualBox is a hypervisor. Hypervisors act as a bridge between virtual hardware and real hardware so that you create virtualized machines. They also provide and efficient sharing of the physical computers resources, as they function as seemingly independent machines, providing you with the ability to create multiple virtual machines on your computer. Virtual machines are a great way to access different operating systems simultaneously and great for building a home network to lab environment. To install VirtualBox, open your browser and enter into the address bar, www.VirtualBox.org to navigate to the VirtualBox site. Once there, select the big green button to download or alternatively, select the downloads link, currently on the left hand side of the page. On the download VirtualBox page, we have the choice of different platforms. I'm using Windows, so I've selected Windows hosts. This will download the most recent version. Depending on your browser, it should download to the default areas. These are either the Desktop or Download folders. Either way you can select for the file to run and once downloaded, we can launch it by clicking the file. Follow the install using the defaults. A warning, network interfaces will appear. Respond yes to this. It's just letting you know that your network interface's connections may be disturbed for a brief moment while it installs a virtual network interface. Select install to continue. VirtualBox installs quickly. Selecting finish will launch the program. Here it is, ready to house our virtual machines.
Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.