No hard disk, monitor, or keyboard is needed for the unencrypted configuration (though a monitor and keyboard might be useful for troubleshooting configurations as needed).
It contains setup software to connect data input streams to data output streams, define communication protocols, and troubleshoot installation problems.
The course emphasizes in-depth theory, didactic lectures, small group discussions, troubleshooting, and informal interactions among faculty and participants.