Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started
← Back to Lessons
  • linux

  • cybersecurity

Edit on Github

Cybersecurity Virtual Machines

Kali Linux Virtual Machine
Debian Virtual Machine

Aside from the publicly known virtual machines to practice cybersecurity we have prepared an additional list of computers that are ideal for learning CyberSecurity:

Kali Linux Virtual Machine

Kali Linux is a specialized Linux distribution designed for penetration testing, security research, computer forensics, and reverse engineering.

We don't have a special procedure for installing Kali Linux; we follow the standard installation process suggested on the main page. You can follow it from this project: Installing Kali Linux on a Virtual Machine.

Debian Virtual Machine

We have prepared a machine with Debian installed, with some basic settings that will be used during the bootcamp.
Otherwise, it is a regular Debian machine like any other, and it will be an important space where you'll learn how to use GNU/Linux systems securely for its use in network environments as a server.

Installing the Debian Virtual Machine

Depending on your operating system:

A) Windows and Linux computers can download the OVA file and must import it to VirtualBox to create the Debian virtual machine. It is a heavy file, so it is advisable to download it in advance to save time when doing the practice.

B) Mac computers can download the ISO file (heavier) and use UTM to emulate (not virtualize) the machine.

1Information to access the Debian machine 2User: debian 3Password: 123456 4RootPassword: 123456