Skip to main content

1.0.1-1.0.2 Why Should I Take This Module and what will i learn?


Protego Security Solutions Task

Welcome to Protego! My name is Alex. I will be your mentor for your first 90 days here. Our recruiter was very impressed with your enthusiasm and desire to enter the cybersecurity profession. 

We’ll be working together to get you ready for your role as an entry-level penetration tester. We’ll be talking about ways that you can prepare for participating in our customer engagements and I have a number of activities for you to complete that will quickly enhance your skills.

We will talk about some important big ideas in penetration testing and then get your practice lab environment up and running. 

I know you will enjoy working at Protego, and I look forward to working with you as you grow in your career with us.

Before we jump into how to perform penetration testing, you first need to understand some core concepts about the “art of hacking” that will help you understand the other concepts discussed throughout this course. For example, you need to understand the difference between ethical hacking and unethical hacking. The tools and techniques used in this field change rapidly, so understanding the most current threats and attacker motivations is also important. Some consider penetration testing an art; however, this art needs to start out with a methodology if it is to be effective. Furthermore, you need to spend some time understanding the different types of testing and the industry methods used. Finally, this is a hands-on concept, and you need to know how to get your hands dirty by properly building a lab environment for testing.




Module Title: Introduction to Ethical Hacking and Penetration Testing

Module Objective: Explain the importance of methodological ethical hacking and penetration testing.


Topic Title Topic Objective
Understanding Ethical Hacking and Penetration Testing Explain the importance of ethical hacking and penetration testing.
Exploring Penetration Testing Methodologies Explain different types of penetration testing methodologies and frameworks.
Building Your Own Lab Configure a virtual machine for your penetration testing learning experience.