Students will set up and configure a Kali Linux virtual machine using Hyper-V, understanding each component of the virtualization process and its cybersecurity applications.
Virtualization allows cybersecurity professionals to test tools and systems safely without risking real networks. Kali Linux is a professional-grade security environment used for ethical hacking and system auditing. By learning Hyper-V and Kali setup, you build the foundation for advanced cybersecurity and ethical penetration testing.
| Term | Definition |
|---|---|
| Hyper-V | Microsoft’s built-in hypervisor that lets you run multiple operating systems on one physical machine. |
| Virtual Switch | A software-based network adapter that connects your virtual machines to the Internet or to each other. |
| VHDX | Virtual Hard Disk file format used by Hyper-V to store the VM’s operating system and files. |
| Generation 2 | A newer Hyper-V VM type that supports UEFI boot, Secure Boot, and modern OS features. |
| Secure Boot | A UEFI feature that only allows trusted, signed operating systems to boot. |
| ISO | A disk image file that contains a complete copy of an operating system installer. |
| Checkpoint | A saved state of a virtual machine you can roll back to later. |
Tech Journal Prompt:
In your own words, what does “virtualization” mean, and why do cybersecurity professionals rely on it?
Quick Demonstration:
Instructor opens Hyper-V Manager and shows a running VM window.
Discuss: “What’s the difference between a virtual and physical machine?”