Skip main navigation

Staying within the law

The underlying principle of ethical hacking is that you cannot attack a system unless you own it or have been authorised to do so.
© Coventry University. CC BY-NC 4.0

Needless to say, a lot of the skills and information that you learn in this course are used by criminals, as well as legitimate penetration testers.

There are a few things that you must be aware of:

  • Often you will be working on the edge of what is legal
  • We are doing our work in a controlled lab environment
  • Throughout the module we will do our best to appraise you of any legal issues that you may run into
  • However, outside the lab it is your responsibility to ensure that you always remain on the right side of the law

The underlying principle of ethical hacking is that you cannot attack a system unless you own it or have been authorised to do so. As part of that authorisation, you will have a clear scope of the assignment and you must stay within the scope at all times.

In addition to this, any external links in this course will take you to third-party websites. Coventry University does not accept responsibility for nor endorse the content of these sites.

© Coventry University. CC BY-NC 4.0
This article is from the free online

Ethical Hacking: An Introduction

Created by
FutureLearn - Learning For Life

Reach your personal and professional goals

Unlock access to hundreds of expert online courses and degrees from top universities and educators to gain accredited qualifications and professional CV-building certificates.

Join over 18 million learners to launch, switch or build upon your career, all at your own pace, across a wide range of topic areas.

Start Learning now