🎯 Learning Intention

Students will set up and configure a Kali Linux virtual machine using Hyper-V, understanding each component of the virtualization process and its cybersecurity applications.

✅ Success Criteria


💡 Why Are We Learning This?

Virtualization allows cybersecurity professionals to test tools and systems safely without risking real networks. Kali Linux is a professional-grade security environment used for ethical hacking and system auditing. By learning Hyper-V and Kali setup, you build the foundation for advanced cybersecurity and ethical penetration testing.


🪩 Vocabulary

Term Definition
Hyper-V Microsoft’s built-in hypervisor that lets you run multiple operating systems on one physical machine.
Virtual Switch A software-based network adapter that connects your virtual machines to the Internet or to each other.
VHDX Virtual Hard Disk file format used by Hyper-V to store the VM’s operating system and files.
Generation 2 A newer Hyper-V VM type that supports UEFI boot, Secure Boot, and modern OS features.
Secure Boot A UEFI feature that only allows trusted, signed operating systems to boot.
ISO A disk image file that contains a complete copy of an operating system installer.
Checkpoint A saved state of a virtual machine you can roll back to later.

🧭 Warm-Up (5 min)

Tech Journal Prompt:

In your own words, what does “virtualization” mean, and why do cybersecurity professionals rely on it?

Quick Demonstration:

Instructor opens Hyper-V Manager and shows a running VM window.

Discuss: “What’s the difference between a virtual and physical machine?”