This document discusses cybersecurity and hacking. It defines cybersecurity as protecting computer systems and networks from data leakage, theft or damage. The document outlines five main types of cybersecurity: critical infrastructure security, network security, internet of things security, application security and cloud security. It also defines malicious hacking as misusing devices to damage or corrupt systems, and ethical hacking as authorized attempts to gain unauthorized access to identify vulnerabilities. The document demonstrates how to protect oneself online and concludes with a demonstration of a phishing attack using cybersecurity tools.