1. Home
  2. Training Library
  3. Course Introduction

How To: Install VirtualBox

Developed with


Cyber Primer Online Learning
Course Introduction

The course is part of this learning path

How To: Install VirtualBox

In this tutorial, you’re going install the VirtualBox software package. VirtualBox is a hypervisor.

What is a hypervisor? Hypervisors act as a bridge between virtual hardware and real hardware, so that you can create virtualised machines. They also enable efficient sharing of the physical computers’ resources, as hypervisors function as seemingly independent machines, giving you the ability to create multiple virtual machines on your computer.

With virtual machines you can:

  • access different operating systems simultaneously.
  • build a home network-to-lab environment.

To install VirtualBox:

  1. Open your browser and enter VirtualBox.org into the address bar to navigate to the VirtualBox site.
  2. Select the big blue button labelled Download VirtualBox 7.0 (or the latest version) to download or select the Downloads link on the left-hand side of the page.

Decorative image: Screenshot of Virtualbox.org with a large blue download button

On the Download VirtualBox page, we have the choice of different platforms. This example uses Windows.

Decorative image of links to VirtualBox binaries and their source code.

  1. Select Windows hosts. This will download the most recent version. Depending on your browser, it should download to the default area – either the Desktop or Download folders.
  2. Once downloaded, launch the file by clicking it. Follow the install using the defaults.
  3. A Warning: Network Interfaces will appear. Respond Yes to this. This message is just to let you know that your network interface's connections may be disturbed for a brief moment while it installs a virtual network interface.
  4. Select Install to continue. VirtualBox should install very quickly.
  5. Select Finish to launch the program. Now it’s ready to house your virtual machines.

This module will introduce some of the core themes of cyber security. They are followed by two software simulations, showing how to install a hypervisor so that a Kali Linux virtual machine can be run. Kali Linux is a Linux operating system used by penetration testers.  

  • Cyber Security  
  • Prevent, Detect, Respond 
  • The CIA Triad  
  • ISMS: Information Security Management Systems
  • Threat Actors  
  • The Cyber-Kill Chain  
  • Attack Surfaces  
  • Installing Virtualbox 
  • Installing Kali Linux 

Intended Audience  

Although perceived as an IT issue, cyber security is, in fact, a subject relevant to all business units. Cyber Primer is aimed at anyone with an interest in cyber security, whether they are looking to pursue a career as a penetration tester, or just want to get a feel for the world of cyber security.  


There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet. 


We welcome all feedback and suggestions - please contact us at qa.elearningadmin@qa.com to let us know what you think. 

About the Author
Learning Paths

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.