Course overview this course gives learners a basic level in competency. It uses a hands-on approach to gain practical experience as a hacker or a penetration tester (white, grey, or black) . This course teaches you how to create a virtual environment for kali linux and windows xp. Before enrolling, you should have completed the first lab. We will start scanning and attacking a windows xp user in lab 2. We will begin scanning and attacking a windows xp victim in lab 2. The course can be completed to prepare you for a position as an ethical hacker or pen-tester. You will be awarded a certificate of completion upon completion. Students must be able to demonstrate fundamental concepts of offensive hacking in order to successfully complete the course. In other words, learners will learn something by doing. Course objectives demonstrate the use of offensive security tools and techniques. Proficiency in the use of the cli (command line interface) of linux. Use linux as a hacking platform. Who should take this course? Network administrators, cybersecurity students, entry-level penetration testers, anyone who wants to be an ethical hacker, concerned parents, concerned spouses, law enforcement and anyone with a solid background in technology. Who should not take this course? Anyone suffering from technophobia (the fear of learning new technology) . This course does not provide a review of the osi model or discuss IP addressing. These skills are required for students to enroll. Hardware pc, laptop, or desktop that can virtualize. (Virtualization enabled bios) . A minimum of 4 gb of ram, (8 gb or more of ram recommended) . Administrative access to the host operating system. You own the machine. (Cannot use a wireless connection) . High-speed internet access using a reliable internet connection. (5Mb or higher throughput) . Software any 64-bit windows operating system. (Preferred) a current 64-bit mac os or linux operating system. Installation of vm ware player (free version) for windows and linux users. Installation of virtualbox on mac. (Links in the laboratory) . Installation 7zip (links in the lab) . Copy kali iso, kali vm ware and virtualbox image. (Links in the laboratory) . Copy windows xp sp2 links (links in the lab) . Copy server 2008 sp2 32 bit links (links in the lab) . Copy metasploitable 2 links (links in the lab) .