# 1.0.1-1.0.2 Why Should I Take This Module and what will i learn?

<div aria-hidden="true" class="article__title-inner" id="bkmrk-">  
</div>## 1.0.1 Why Should I Take This Module?

<div aria-hidden="true" class="article__title-inner" id="bkmrk--1"></div><div class="article 643fe0159eaee20f20bcf1da background-color-gray   is-complete " data-adapt-id="643fe0159eaee20f20bcf1da" id="bkmrk--2"><div class="article__inner"><div class="block__container"><div class="block 6442d1f0e96d0e1d078133e4 background-color-gray remove-padding-top   is-complete " data-adapt-id="6442d1f0e96d0e1d078133e4"><div class="block__inner"><div class="component__container"><div class="component graphic 6442d2bd87ab4e1c175b654e mentor_image forty-padding-top is-left is-complete zoom-img-enabled" data-adapt-id="6442d2bd87ab4e1c175b654e"><div class="component__inner graphic__inner"><div class="component__widget graphic__widget"><div class="graphic__image-container">![](https://skillsforall.com/content/eh/1.0/m1/course/en-US/assets/06ec07a67d19c2f7f55d228a9f4e463524053d82.png)</div></div></div></div><div class="component text 6442d1f0e96d0e1d078133e5 half_padding is-right is-complete zoom-img-enabled" data-adapt-id="6442d1f0e96d0e1d078133e5"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Protego Security Solutions Task**

Welcome to Protego! My name is Alex. I will be your mentor for your first 90 days here. Our recruiter was very impressed with your enthusiasm and desire to enter the cybersecurity profession.

We’ll be working together to get you ready for your role as an entry-level penetration tester. We’ll be talking about ways that you can prepare for participating in our customer engagements and I have a number of activities for you to complete that will quickly enhance your skills.

We will talk about some important big ideas in penetration testing and then get your practice lab environment up and running.

I know you will enjoy working at Protego, and I look forward to working with you as you grow in your career with us.

Before we jump into how to perform penetration testing, you first need to understand some core concepts about the “art of hacking” that will help you understand the other concepts discussed throughout this course. For example, you need to understand the difference between *ethical hacking* and *unethical hacking*. The tools and techniques used in this field change rapidly, so understanding the most current threats and attacker motivations is also important. Some consider penetration testing an art; however, this art needs to start out with a methodology if it is to be effective. Furthermore, you need to spend some time understanding the different types of testing and the industry methods used. Finally, this is a hands-on concept, and you need to know how to get your hands dirty by properly building a lab environment for testing.

<div class="article b5c8963e283b4fa08854df45e0345b06    is-complete " data-adapt-id="b5c8963e283b4fa08854df45e0345b06" id="bkmrk--3"><div class="article__inner"><div class="block__container"><div class="block 6446975aa70da71fb1703d4b    is-complete " data-adapt-id="6446975aa70da71fb1703d4b"><div class="block__inner"></div></div></div></div></div><div class="article b5c8963e283b4fa08854df45e0345b06    is-complete " data-adapt-id="b5c8963e283b4fa08854df45e0345b06" id="bkmrk--5"><div class="article__inner"><div class="block__container"><div class="block 6446975aa70da71fb1703d4b    is-complete " data-adapt-id="6446975aa70da71fb1703d4b"><div class="block__inner"><div class="component__container">---

<div class="component blank 6446975da70da71fb1703d4c is-full is-complete zoom-img-enabled" data-adapt-id="6446975da70da71fb1703d4c">  
</div></div></div></div></div></div></div>## 1.0.2 What Will I Learn in This Module?

<div aria-hidden="true" class="article__title-inner" id="bkmrk--6"></div><div class="article 643fe0169eaee20f20bcf1db background-color-white   is-complete " data-adapt-id="643fe0169eaee20f20bcf1db" id="bkmrk--7"><div class="article__inner"><div class="block__container"><div class="block 643fe0179eaee20f20bcf1fd background-color-white remove-padding-bottom   is-complete " data-adapt-id="643fe0179eaee20f20bcf1fd"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf23d    is-full is-complete " data-adapt-id="643fe01a9eaee20f20bcf23d"><div class="component__inner text__inner"><div class="component__header text__header"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div></div></div></div>**Module Title**: Introduction to Ethical Hacking and Penetration Testing

**Module Objective**: Explain the importance of methodological ethical hacking and penetration testing.

<div class="article 643fe0169eaee20f20bcf1db background-color-white   is-complete " data-adapt-id="643fe0169eaee20f20bcf1db" id="bkmrk-topic-title-topic-ob"><div class="article__inner"><div class="block__container"><div class="block 643fe0179eaee20f20bcf1fd background-color-white remove-padding-bottom   is-complete " data-adapt-id="643fe0179eaee20f20bcf1fd"><div class="block__inner"><div class="component__container"><div class="component text 643fe01a9eaee20f20bcf23d    is-full is-complete " data-adapt-id="643fe01a9eaee20f20bcf23d"><div class="component__inner text__inner"><div class="component__header text__header" id="bkmrk--8"><div class="component__header-inner text__header-inner"><div class="component__body text__body"><div class="component__body-inner text__body-inner">  
</div></div></div></div></div></div></div></div></div><div class="block 643fe0179eaee20f20bcf1fe background-color-white  remove-padding-top   is-complete " data-adapt-id="643fe0179eaee20f20bcf1fe"><div class="block__inner"><div class="component__container"><div class="component table 643fe01a9eaee20f20bcf23e is-full is-complete" data-adapt-id="643fe01a9eaee20f20bcf23e"><div class="table-inner component-inner"><div class="table-wrapper"><div class="table-widget component-widget"><table style="min-width: 800px;"><tbody><tr class="table-row nth-child-0 "><th class="table-data table-heading nth-child-0 " colspan="1" rowspan="1">**Topic Title**</th><th class="table-data table-heading nth-child-1 " colspan="1" rowspan="1">**Topic Objective**</th></tr><tr class="table-row nth-child-1 "><td class="table-data nth-child-0 " colspan="1" rowspan="1">Understanding Ethical Hacking and Penetration Testing</td><td class="table-data nth-child-1 " colspan="1" rowspan="1">Explain the importance of ethical hacking and penetration testing.</td></tr><tr class="table-row nth-child-2 "><td class="table-data nth-child-0 " colspan="1" rowspan="1">Exploring Penetration Testing Methodologies</td><td class="table-data nth-child-1 " colspan="1" rowspan="1">Explain different types of penetration testing methodologies and frameworks.</td></tr><tr class="table-row nth-child-3 "><td class="table-data nth-child-0 " colspan="1" rowspan="1">Building Your Own Lab</td><td class="table-data nth-child-1 " colspan="1" rowspan="1">Configure a virtual machine for your penetration testing learning experience.</td></tr></tbody></table>

</div></div></div></div></div></div></div></div></div></div>