The last step of a penetration test is cleaning up all of the changes made to the target system. This lab will demonstrate the use of various Tools, Techniques, and Procedures to clean up the target host that has been exploited.

In this lesson, the student will learn the fundamentals of networking. The student will use the Linux operating system as a tool to understand networking concepts. By now, the student should understand the Internet, ethernet connections, and Wi-Fi. By the end of this lesson, the student should understand how machines communicate with each other in a network.

In this exercise, we will explore some various tools in the Linux operating system. Though Kali Linux comes preloaded with many tools for security practice, it is like all other operating systems with web browser applications and text editors. These tools, however, can serve every security personnel in some administrative way.

This laboratory exercise will expand your understanding of the Linux Terminal (sometimes called the “shell”, command-line, or CLI) and introduction to a powerful set of tools all cyber security professionals should fully embrace. Linux and UN*X based operating systems are comprised of thousands of “many small tools that do one thing well,” as the saying goes – a realization that only more seasoned experts fully appreciate.

Managing Security, Safety, and Risk Updated!

This is the third module in the Cyber-Physical Industry course; however, it can be taught as a standalone module.  The purpose of this module is to introduce students to an integrated perspective on security, safety, and risk that has quality management at its center.

8 Lessons

The purpose of this module is to introduce students to the use of Kali Linux to perform a penetration test against a target system in a controlled lab environment. The material is approached from the perspective of what an actual penetration tester would do in a real-life penetration testing scenario.