Technology Labs

CYBER SECURITY & ETHICAL HACKING TRAINER (Model : NL - CSHT)

About Product

CYBER SECURITY & ETHICAL HACKING TRAINER (Model: NL-CSHT)A hands-on training platform based on Kali Linux for learning cybersecurity, ethical hacking, and network security concepts. Enables real-time attack, defense, monitoring, and analysis using practical experiments and industry-standard tools.

SALIENT FEATURES

• Kali Linux-based nodes: Sender, Receiver, and Intruder for hands-on real-time attack and defense practice
• Cybersecurity covered through ethical hacking practice
• Many main topics are covered under various experiments
• Topics covered include Network Administration, Cybersecurity Fundamentals, Network/System Security &Threat Prevention Techniques, Network/System Threats & Ethical Hacking, Cryptography, Cryptography Applications to IoT Cloud
• Kali Linux PC is ergonomically designed and aesthetically mounted in a sturdy aluminium 30×30 profile rack with built-in USB keyboard, USB mouse, HDMI monitor & SMPS
• Live traffic monitoring using port mirroring to analyze real-time packet flow on the WIN LAB PC screen using industry-standard network monitoring software (Wireshark) - Open Source
• User-friendly student workbook & instructor guide provided for step-by-step experimentation
TECHNICAL SPECIFICATION
Node Configuration3 Linux PCs (Sender, Receiver, Intruder/Hacker) – role selectable at runtime, connected in LAN using smartswitch portNode
Hardware
• Quad-core Cortex-A72 (ARM v8) 64-bit SoC @ 1.8 GHz
• 4 GB LPDDR4-3200 SDRAM
• 2.4 GHz & 5.0 GHz IEEE 802.11ac wireless
• Bluetooth 5.0
• BLE Gigabit Ethernet
• 2 USB 3.0 ports, 2 USB 2.0 ports
• Micro-SD card slot for booting operating system & application folder

Node Software
• Pre-installed Kali Linux
• GUI executables, Tailored Python & Bash scripts provided in home directory for experiments

PC Software
• One Lab PC with WIN10 / WIN11 with USB port required (PC not in scope of supply)

PC Hardware
• Wireshark used to capture/display data transactions as security breaches take place during experimentsusing USB-to-Ethernet dongle

Power Supply
• Each node has built-in SMPS (5V / 5A)
• Power adapter provided for smart switch portGeneral
• Operating temperature: 0°C to 50°C
• Power: 100–250 VAC / 50–60 Hz
• Dimensions: 910 mm (L) × 530 mm (W) × 300 mm (D)
• Net Weight: 15 kg, Gross Weight: 20 kgAccessories
• RJ45 cables – 4 Nos• USB-to-Ethernet dongle – 1 No
• USB keyboard – 3 Nos
• USB mouse – 3 Nos
• Smart Ethernet switch – 1 No
• Power adapter – 1 No
• 3-socket AC power extension – 3 Nos
List of Experiments / Topics Covered

• Setting up network connections
• Network identification & discovery
• Steganography
• Intrusion Detection System (IDS)
• Firewall protection
• Intrusion Prevention System (IPS)
• Authentication
• Password sniffing
• Session hijacking
• Trojan & spyware analysis
• Virus & worms analysis
• Distributed Denial of Service (DDoS)
• Spoofing using Wireshark
• Packet sniffing using Wireshark
• Website security
• Email security
• Malware analysis
• Viruses
• Worms
• Trojans
• Backdoors
• Spyware
• Digital signature
• Encryption – symmetric
• Encryption – asymmetric
• Block cipher
• Hashing
• Message authentication

With 35 years of legacy in Technical Education, Akademika  extends its expertise to Defence and Skill development, building Innovative, Reliable Training Systems for the next generation of Learners.

Address

Unit No 128/129, Hema Industrial Estate, Sarvodaya Nagar,
Jogeshwari East, Mumbai, Maharashtra 400060
Tele +91 7447438443

Get Direction