1.3 Prerequisites for the Course
Course Prerequisites
This course is beginner-friendly — even though the content reaches advanced pentesting levels, everything is broken down clearly for learners of all backgrounds.
✅ What You Need Before Starting:
Kali Linux Virtual Machine (VM) - Install Instructions
- Required environment for the course.
- Setup is not covered in the course but documentation is linked in the module.
- Alternatives: Ubuntu or other Linux distros are fine if you're comfortable with the command line.
- Windows (with WSL) may work but is not officially supported.
Basic Understanding of Phishing
- Know what phishing is, its goals, and how attackers use it.
- Prior exposure to phishing concepts (e.g. from Simply Cyber Academy) is recommended but not mandatory.
A Desire to Learn
- Most importantly, come ready to take notes!
- Note-taking helps solidify your understanding and lets you build your own reference playbook.
- You're encouraged to apply what you learn: teach others, document internally, or present at work.
Once you have those three things ready, you’re all set to move into the technical setup and lab configuration. Let’s go!