BIOS Functions of BIOS Architectures of OS Who is a Hacker Skills of a Hacker Types of Hackers Reasons for Hacking Who are at the risk of Hacking attacks Effects of Computer Hacking on an organization The Security, Functionality & Usability Triangle What is Ethical Hacking Why Ethical Hacking is Necessary Scope & Limitations of Ethical Hacking