Welcome to Module 1. This is where our journey begins. We'll explore what ethical hacking really means, who does it, and why it's one of the most exciting and important careers in technology today. By the end of this module, you'll have a solid foundation in information security concepts.
🎓 LEARNING OBJECTIVES
🕵️Who an Ethical Hacker is
🔒Attributes of Secured Data (CIA Triad)
📚Commonly Used Terminology
🔄Ethical Hacker vs Penetration Tester
📋Ways Penetration Tests are Conducted
⚖️Cybercrimes and Cyber Laws
On completing this module you should know:
- The difference between ethical and malicious hacking
- How to classify different types of hackers
- The three pillars of information security
- The five phases hackers follow when attacking systems
- Essential cybersecurity terminology
- How penetration testing differs from ethical hacking
- The legal framework governing cybersecurity in Nigeria