MODULE 1: INTRODUCTION TO ETHICAL HACKING

Welcome to Module 1. This is where our journey begins. We'll explore what ethical hacking really means, who does it, and why it's one of the most exciting and important careers in technology today. By the end of this module, you'll have a solid foundation in information security concepts.
🎓 LEARNING OBJECTIVES
🕵️
Who an Ethical Hacker is
👥
Types of Hackers
🔒
Attributes of Secured Data (CIA Triad)
⚔️
5 Phases of Attack
📚
Commonly Used Terminology
🔄
Ethical Hacker vs Penetration Tester
📋
Ways Penetration Tests are Conducted
⚖️
Cybercrimes and Cyber Laws

On completing this module you should know:

  • The difference between ethical and malicious hacking
  • How to classify different types of hackers
  • The three pillars of information security
  • The five phases hackers follow when attacking systems
  • Essential cybersecurity terminology
  • How penetration testing differs from ethical hacking
  • The legal framework governing cybersecurity in Nigeria