This course will be demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems, using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system. This knowledge is assessed by answering multiple choice questions regarding various ethical hacking techniques and tools.Ethical hacking is performed by an individual or a company to help identify potential threats on a computer or network. An ethical hacker attempts to bypass system security and search for any weak points that could