0% found this document useful (0 votes)
412 views

Kali Linux Virtual Lab Setup

This document outlines a course on Kali Linux Virtual Lab Setup. It includes 4 units covering installing VMware and Kali Linux, basic Kali Linux commands, package management and networking concepts, and cyber security topics like malware and hackers. Students will learn to install relevant software, execute Kali commands, manage packages, understand networks, and work with vulnerabilities. The course aims to help students understand key operating systems installation, study Kali Linux tools, and learn about security testing through hands-on experiments.

Uploaded by

nagarjuna0595
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
412 views

Kali Linux Virtual Lab Setup

This document outlines a course on Kali Linux Virtual Lab Setup. It includes 4 units covering installing VMware and Kali Linux, basic Kali Linux commands, package management and networking concepts, and cyber security topics like malware and hackers. Students will learn to install relevant software, execute Kali commands, manage packages, understand networks, and work with vulnerabilities. The course aims to help students understand key operating systems installation, study Kali Linux tools, and learn about security testing through hands-on experiments.

Uploaded by

nagarjuna0595
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Kali Linux Virtual Lab Setup

II B. Tech. –IV Semester (Code: 20CBS303)


Practicals : 5 Hours/Week (2T+3P) Continuous : 30
Assessment
Final Exam : 3 hours Final Exam Marks : 70

Pre-Requisite: Operating Systems (20CS304).

Course Objectives: Students will be able to:


CO1 Know the installation of VM-ware & Kali Linux & Windows OS.
CO2 Execute different Kali Linux commands.

CO3 Learn about Package-management system, Networks, and IPv4 - Address Classes.

CO4 Know the malwares, hackers, and DVWA installation & Configurations.

Course Outcomes:
CLO-1 Understand the installation of VM-ware, Kali Linux & Windows OS.
CLO-2 Execution of different Kali Linux commands.
CLO-3 Study about Package-management system, Networks, MAC and IPv4 - Address Classes.
CLO-4 Understand the malwares, hackers, and DVWA installation & Configurations.

UNIT-1 (8 Hours)

Installing & Basic Over View: Introduction to VM-ware & Kali Linux, Kali Distribution, System
Requirements, Different ways of installing Kali Linux, Installing VM-ware, Installing VM ware
Tools, Installing Kali Linux, installing Metasploit able 2, Installing Windows OS.

LIST OF EXPERIMENTS
1. Installation of VM-ware in windows operating systems.
2. Installation of kali linux in VM-ware.
3. Installation of windows OS in VM-ware.
4. Installation of metaspotiable-2 in VM-ware.

UNIT-2 (8 Hours)
Kali Linux commands: -  uname, pwd, ls, history, ifconfig, echo, cat, Clear, mkdir, rmdir cd,
cp, mv, rm, more,  less, sort, vi, nano, leafpad, chmod,Whoami, Who, Uptime, cal, date, ps,
kill.

LIST OF EXPERIMENTS
1. Execution of Kali Linux commands.
UNIT-3 (12 Hours)
Package-management system: - package, Updating & upgrading of packages, Differentiate
update & upgrade. Install, remove and purge a new package.

Network Introducion: - Computer, Network, LAN, MAN and WAN, Topologies, client-server &
peer to peer architecture architecture, Transmission medium.
MAC & IP ADDRESSS-IPV4:-

LIST OF EXPERIMENTS
1. Updating & upgrading of available packages in the systems
2. Install, remove and purge a new package in a System.

UNIT-4 (12 Hours)


Basic Terminology:- Cyber Security, Virus & it’s types, Anti-virus, Worms, Trojan horses, White
hat hackers, Black hat hackers.

DVWA: - Introduction, Installation & Configuration.

LIST OF EXPERIMENTS
1. Installing & Configuration of DVWA web application.

References : 1. Basic Security Testing with Kali Linux -Daniel W. Dieterle


2. Hacking exposed web applications - JOEL SCAMBRAY MIKE SHEMA.
3. Cryptography and network security –Behrouz A. Forouzan.

You might also like