Aside from the publicly known virtual machines to practice cybersecurity we have prepared an additional list of computers that are ideal for learning CyberSecurity:
Kali Linux is a specialized Linux distribution designed for penetration testing, security research, computer forensics, and reverse engineering.
We don't have a special procedure for installing Kali Linux; we follow the standard installation process suggested on the main page. You can follow it from this project: Installing Kali Linux on a Virtual Machine.
We have prepared a machine with Debian installed, with some basic settings that will be used during the bootcamp.
Otherwise, it is a regular Debian machine like any other, and it will be an important space where you'll learn how to use GNU/Linux systems securely for its use in network environments as a server.
Depending on your operating system:
A) Windows and Linux computers can download the OVA file and must import it to VirtualBox to create the Debian virtual machine. It is a heavy file, so it is advisable to download it in advance to save time when doing the practice.
B) Mac computers can download the ISO file (heavier) and use UTM to emulate
(not virtualize) the machine.
1Information to access the Debian machine 2User: debian 3Password: 123456 4RootPassword: 123456