Lesson 2a – Ethical Hacking and Countermeasures