Get In Touch

Cyber Security & Ethical Hacking Trainer (XPO-CSEH)

The cyber security & ethical hacking trainer is a hands-on platform featuring three Kali Linux-based nodes—Sender, Receiver, and Intruder—for real-time attack and defense practice. Covering 22 experiments across five key topics, it explores cybersecurity fundamentals, ethical hacking, threat prevention, and cryptography applications for IoT and cloud. Housed in a sturdy aluminum rack with integrated peripherals, the trainer includes tools like Wireshark® for live traffic monitoring and comes with a student workbook and instructor’s guide for structured learning.

Category:

Salient Features

  • 3 Kali Linux based Nodes: Sender, Receiver, and Intruder for a hands-on real-time attack and defense practice.
  • Cybersecurity covered through ethical hacking practice.
  • 5 main topics covered under 22 Experiments
  • Main topics covered are Network Adminstration/ Cybersecurity Fundamentals, Network/ System Security & Threat Prevention Techniques, Network/ System Threats & Ethical Hacking, Cryptography, Cryptography Applications to IoT Cloud
  • Kali Linux PC is ergonomically designed & aesthetically mounted in a sturdy aluminum (30×30) profile rack with built in USB keyboard, USB mouse, HDMI monitor & SMPS.
  • Live Traffic Monitoring using port mirroring to analyze real-time packet flow on WIN Lab PC screen using industry standard network monitoring software (Wireshark®).
  • User friendly student workbook & Instructors guide provided for step by step experimentation

Technical Specifications

Node Configuration: 3 Linux PCs Sender, Receiver, Intruder/Hacker — role selectable at runtime, Connected in LAN using smart switch port

Node Hardware: Quad core Cortex-A72 (ARM v8) 64-bit SoC @ 1.8GHz 4GB LPDDR4-3200 SDRAM 2.4 GHz and 5.0 GHz IEEE 802.11ac wireless, Bluetooth 5.0, BLE Gigabit Ethernet 2 USB 3.0 ports; 2 USB 2.0 ports. Micro-SD card slot for loading operating system and Application Folder

Node Software: Preinstalled Kali Linux, GUI Executables, Tailored Python & Bash Scripts provided in Home directory for experiments.

PC Software: One Lab PC with (P4/XP,WIN7/8/10/11) with USB port needed (PC is not scope of supply)

PC Hardware: Wireshark® is used to capture/display data transactions as security breaches take place during experiments using
USB to Ethernet dongle

Reviews

There are no reviews yet.

Be the first to review “Cyber Security & Ethical Hacking Trainer (XPO-CSEH)”

Your email address will not be published. Required fields are marked *

× How can I help you?