This course will provide a practical introduction to ethical hacking (also known as Penetration Testing). Ethical hacking involves identifying and testing weaknesses in a system or network that might allow unauthorized access to data or system resources. The purpose of ethical hacking is to improve the security of the systemor network by fixing vulnerabilities found during testing. Students will use the same methods and tools used by malicious hackers (such as Kali Linux and other related tools) to scan wired and wireless networks, intercept network traffic, subvert encryption, and develop and deploy malware. Students will also assess andpropose solutions to common security problems. A signed pledge is required from students to abide by a code of ethics in using the techniques taught in this class.