1.3 Prerequisites for the Course

Course Prerequisites

This course is beginner-friendly — even though the content reaches advanced pentesting levels, everything is broken down clearly for learners of all backgrounds.

✅ What You Need Before Starting:

Kali Linux Virtual Machine (VM) - Install Instructions

  • Required environment for the course.
  • Setup is not covered in the course but documentation is linked in the module.
  • Alternatives: Ubuntu or other Linux distros are fine if you're comfortable with the command line.
  • Windows (with WSL) may work but is not officially supported.

Basic Understanding of Phishing

  • Know what phishing is, its goals, and how attackers use it.
  • Prior exposure to phishing concepts (e.g. from Simply Cyber Academy) is recommended but not mandatory.

A Desire to Learn

  • Most importantly, come ready to take notes!
  • Note-taking helps solidify your understanding and lets you build your own reference playbook.
  • You're encouraged to apply what you learn: teach others, document internally, or present at work.

Once you have those three things ready, you’re all set to move into the technical setup and lab configuration. Let’s go!

Complete and Continue