Introduction to Cybersecurity with Kali Linux - Part 1 & 2
Tue 21 Jan 2025 10:00 AM - Wed 22 Jan 2025 2:30 PM
The Bridge, Dumfries, DG2 9AW
Description
Summary
Cybersecurity is all about protecting our digital assets – computers, networks, data – from unauthorized access, theft, or damage. As technology becomes ever more integrated into our lives, cybersecurity becomes increasingly important.
Eligibility
You need to be a Dumfries and Galloway region resident at the age of 19 and above, the caveat to that is that you're a school leaver with no positive destination in mind.
Pre-Requisite
This course is designed for individuals with an interest in cybersecurity and penetration testing. Basic familiarity with Linux environment required.
Course Duration
Two Days (1000 to 1430 hours GMT) with a 30 minute break in both sessions.
Course Objectives
- Gain a foundational understanding of cybersecurity concepts.
- Explore the functionalities and tools available in Kali Linux.
- Learn basic techniques for information gathering and vulnerability scanning.
- Practice password cracking and exploitation methodologies in a safe environment.
- Understand the ethical considerations and responsible disclosure practices in penetration testing.
Outline
Day 1
Introduction to Cybersecurity (1 hour)
- What is cybersecurity?
- Common cyber threats and attack vectors
- Ethical hacking and penetration testing concepts
- Importance of secure systems and responsible disclosure
Introduction to Kali Linux (1 hour)
- Overview of Kali Linux and its purpose in cybersecurity
- Setting up a virtual machine environment for Kali Linux
- Navigating the Kali Linux terminal and basic commands
- Understanding package management with apt
Information Gathering and Reconnaissance (1 hour)
- Techniques for gathering information about target systems (OSINT)
- Using tools like Whois, DNS resolution, and network scanning (Nmap)
- Identifying potential vulnerabilities and entry points
Day 2
Vulnerability Scanning and Exploitation (1 hour)
- Introduction to vulnerability scanners (OpenVAS)
- Identifying exploitable vulnerabilities in target systems
- Understanding exploit development and ethical considerations
- Hands-on practice with pre-built exploits in a controlled environment
Password Cracking Techniques (1 hour)
- Different types of password attacks (dictionary attacks, brute-force)
- Tools for password cracking (John the Ripper)
- Importance of strong passwords and secure password practices
Post-Exploitation and Maintaining Access (1 hour)
- Techniques for maintaining access to compromised systems (persistence)
- Privilege escalation and gaining higher user privileges
- Covering tracks and avoiding detection
Ethical Hacking and Responsible Disclosure (1 hour)
- Importance of ethical hacking and responsible disclosure practices
- Legal aspects of penetration testing and vulnerability reporting
- Following ethical guidelines for conducting safe and legal penetration testing
Course Wrap-up (30 min)
- Q&A and Discussion on cybersecurity with Kali Linux
- Introduction to further learning resources for penetration testing
- Course Feedback
Note: This outline prioritizes hands-on learning. Labs and the mini-project should be designed to solidify concepts and encourage teamwork. Consider offering project templates or guidance for beginners while allowing flexibility for experienced participants.
Location
The Bridge, Dumfries, DG2 9AW