1 00:00:06,853 --> 00:00:10,156 - Welcome to Lesson 1: Overview of Ethical Hacking 2 00:00:10,156 --> 00:00:11,905 and Penetration Testing. 3 00:00:11,905 --> 00:00:14,573 In this lesson, we start with an introduction 4 00:00:14,573 --> 00:00:17,373 to ethical hacking and pen testing. 5 00:00:17,373 --> 00:00:19,913 You will learn how to get started with ethical hacking 6 00:00:19,913 --> 00:00:22,981 and pen testing and also become familiarized 7 00:00:22,981 --> 00:00:26,472 with the legal aspects of penetration testing. 8 00:00:26,472 --> 00:00:29,143 In addition, this lesson explores the different 9 00:00:29,143 --> 00:00:31,096 penetration testing methodologies, 10 00:00:31,096 --> 00:00:33,256 where you will learn about the different 11 00:00:33,256 --> 00:00:36,483 penetration testing and cyber security certifications 12 00:00:36,483 --> 00:00:38,188 in the industry. 13 00:00:38,188 --> 00:00:39,636 We will share a few pointers 14 00:00:39,636 --> 00:00:41,930 on how to build your own hacking lab, 15 00:00:41,930 --> 00:00:43,814 and also you will learn a whole bunch 16 00:00:43,814 --> 00:00:46,469 of open source and commercial tools 17 00:00:46,469 --> 00:00:48,249 that you can actually use during your 18 00:00:48,249 --> 00:00:50,977 penetration testing and your engagements. 19 00:00:50,977 --> 00:00:53,506 This lesson then concludes with a look 20 00:00:53,506 --> 00:00:56,343 at vulnerabilities, threats, and exploits, 21 00:00:56,343 --> 00:00:59,759 and actually, an overview of today's threat landscape. 22 00:00:59,759 --> 00:01:01,090 Well, we have a lot of material to cover, 23 00:01:01,090 --> 00:01:02,840 so let's get started.