Ethical Hacking course | Part 2/33 | Basic Terms of Hacking