This course introduces the ethics and laws of ethical hacking, and it discusses the different types of threats including insider threat. Moreover, it explains the approaches that an ethical hacker uses for footprinting and reconnaissance, scanning networks, enumeration, vulnerability analysis and system hacking. Furthermore, this course consists of a set of laboratory experiments that provides hands-on experience in ethical hacking.