Salient Features
3 Kali Linux based Nodes: Sender, Receiver, and Intruder for a hands-on real-time attack and defense practice. Cybersecurity covered through ethical hacking practice. 5 main topics covered under 22 Experiments Main topics covered are Network Adminstration/ Cybersecurity Fundamentals, Network/ System Security Threat Prevention Techniques, Network/ System Threats Ethical Hacking, Cryptography, Cryptography Applications to IoT Cloud Kali Linux PC is ergonomically designed aesthetically mounted in a sturdy aluminum (30x30) profile rack with built in USB keyboard, USB mouse, HDMI monitor SMPS. Live Traffic Monitoring using port mirroring to analyze real-time packet flow on WIN Lab PC screen using industry standard network monitoring software (Wireshark). ser friendly student workbook Instructors guide provided for step by step experimentation