1 00:00:00,630 --> 00:00:07,470 Greetings, I'm Professor Kay, and welcome to the short course overview on my capture the flag walk 2 00:00:07,470 --> 00:00:07,710 through. 3 00:00:08,900 --> 00:00:15,320 Capture the flag exercises, allow us to take what we've learned in theory and actually apply it. 4 00:00:15,500 --> 00:00:21,650 The idea being that we can have all the lectures, we can watch all the power points, but until we 5 00:00:21,650 --> 00:00:26,510 can apply what it is we have learned, then none of that really matters for this car. 6 00:00:26,550 --> 00:00:32,650 Students will be using virtual box to create all of their virtual machines, all in training software, 7 00:00:32,690 --> 00:00:38,570 the ISO downloads and any old VA files that are needed for the labs are provided in the lab files. 8 00:00:39,140 --> 00:00:44,810 You're going to need to create at least one virtual install of Linux and one virtual install for each 9 00:00:44,810 --> 00:00:46,300 of the target machines. 10 00:00:46,640 --> 00:00:52,460 Everyone should complete Section two, which is the building of their virtual lab environment before 11 00:00:52,460 --> 00:00:55,350 making any final purchases for this course. 12 00:00:56,090 --> 00:01:00,230 Most of the time, captured fire exercises are conducted by teams. 13 00:01:00,230 --> 00:01:07,160 But when we're just starting out and we want to be able to actually learn the tricks of the trade, 14 00:01:07,160 --> 00:01:14,210 so to speak, we can use these captured fly exercises in our own private lab environment and we can 15 00:01:14,210 --> 00:01:21,160 learn forensic cryptography, web exploitation, reverse engineering and binary exploitation. 16 00:01:21,920 --> 00:01:24,800 It's one of the best ways to learn specific security skills. 17 00:01:24,960 --> 00:01:27,960 It's also helps to build a hacker persistence. 18 00:01:27,980 --> 00:01:33,890 Now, what that means is that you don't give up because a lot of times you're going to get stuck with 19 00:01:33,890 --> 00:01:35,960 these capture flag exercises. 20 00:01:36,620 --> 00:01:37,870 Some things are going to change. 21 00:01:38,090 --> 00:01:40,880 Nothing remains constant when it comes to technology. 22 00:01:41,090 --> 00:01:43,970 And that includes the capture of flag exercises. 23 00:01:44,420 --> 00:01:50,240 The OS is get upgraded, not the target so much, but the Calli installation. 24 00:01:50,510 --> 00:01:56,330 We have all different types of tools that suddenly become abandoned by the developers. 25 00:01:56,330 --> 00:02:01,940 And so maybe that tool is no longer able to work with the latest version of Cauli. 26 00:02:02,180 --> 00:02:08,120 Well, that's going to require that you do some research and find your way around that wall that you 27 00:02:08,120 --> 00:02:08,960 suddenly hit. 28 00:02:09,800 --> 00:02:11,530 That is hackers persistence. 29 00:02:11,810 --> 00:02:19,100 You don't give up the preferred operating system for this course or any captured flight course would 30 00:02:19,100 --> 00:02:22,910 be a Windows operating system seven, eight or 10. 31 00:02:23,150 --> 00:02:26,600 You can use a Mac machine and you can use lightning. 32 00:02:26,810 --> 00:02:29,980 But the preferred system would be a Windows seven, eight or 10. 33 00:02:30,680 --> 00:02:36,080 You should have at least a minimum of four gigabytes of RAM, but eight gigabytes is recommended. 34 00:02:36,290 --> 00:02:39,200 Does not to say that that's going to be enough? 35 00:02:39,440 --> 00:02:46,640 It all depends on a lot of other underlying variables, such as your type of CPU, how many cores it 36 00:02:46,640 --> 00:02:51,800 has, what type of ram you have, what type of hard drive are you using. 37 00:02:52,400 --> 00:02:55,420 So you can see that eight gigabytes is barely enough. 38 00:02:56,240 --> 00:03:00,110 You're going to need a system bio's capable of supporting virtualization. 39 00:03:01,020 --> 00:03:05,760 You're also going to need a high speed Internet connection or a good Internet connection, because some 40 00:03:05,760 --> 00:03:10,650 of these ISO images and these target machines are very large. 41 00:03:10,830 --> 00:03:12,480 They're going to take some time to download. 42 00:03:12,490 --> 00:03:15,930 So make sure that you have all this in place before you sign up. 43 00:03:15,930 --> 00:03:20,310 And this is all part of completing Section two of the course, which is free. 44 00:03:20,850 --> 00:03:27,450 Complete that and then you'll be able to see whether or not you're all set up and ready to move on with 45 00:03:27,540 --> 00:03:33,600 the rest of the capture the flag exercises while I was there previously mentioned, you should have 46 00:03:33,750 --> 00:03:40,000 that theory, that basic knowledge of what you need to know to understand what's actually going on inside 47 00:03:40,000 --> 00:03:43,190 of the courtroom with these captured flag exercises. 48 00:03:43,710 --> 00:03:45,690 Do you know what a port is? 49 00:03:45,880 --> 00:03:47,550 You know what a protocol is. 50 00:03:47,700 --> 00:03:49,200 Do you understand port numbers? 51 00:03:49,440 --> 00:03:57,150 Do you understand how TCP IP communicate and allows devices to see each other on a network? 52 00:03:57,330 --> 00:03:59,610 Those are the things that you have to understand. 53 00:03:59,790 --> 00:04:06,660 If you can understand the basic principles of technology, of networking, then you'll probably be able 54 00:04:06,660 --> 00:04:09,780 to get through this course without a whole lot of grief and aggravation. 55 00:04:10,740 --> 00:04:16,470 Again, thank you for dropping by, and I do appreciate the patronage, and if you need anything, don't 56 00:04:16,470 --> 00:04:18,330 hesitate to reach out and contact me. 57 00:04:18,750 --> 00:04:19,090 Thanks. 58 00:04:19,110 --> 00:04:20,520 And I hope to see you in the courtroom.