The purpose of this module is to introduce students to the use of Kali Linux to perform a penetration test against a target system in a controlled lab environment. The material is approached from the perspective of what an actual penetration tester would do in a real-life penetration testing scenario. 

This is the fourth and final module in the Cyber-Physical Industry course; however, it can be taught as a standalone module.  The purpose of this module is to introduce students to physical and cognitive ergonomics (human factors), and explain why this discipline is so critical for cybersecurity management. The lessons relate musculoskeletal, metabolic, environmental, and cognitive aspects of performance to contextual risk.

7 Lessons
Module/Workshop
Reconnaissance New!

This module covers the first stage of an attack. Reconnaissance is the stage where an attacker will gather as much information as possible about their target before they exploit a system. Much of the module will cover OSINT or open source intelligence. Topics include passive and active footprinting, competitive intelligence gathering, whois/rdap lookups, website cloning, and email tracking and harvesting.

5 Lessons