This document provides an introduction to ethical hacking. It discusses key concepts like security fundamentals, risks, assets, threats and vulnerabilities. It defines exploits and risk assessment. It also covers topics like backup risks, quantitative risk assessment processes, and security testing which is a core responsibility of ethical hackers. The goal is to teach students how to protect enterprise data, applications and networks from hackers by developing cyber defense capabilities through ethical hacking techniques and methods.