This document discusses ethical hacking and provides definitions and overviews of key concepts. It defines ethical hacking as an authorized practice to detect vulnerabilities in a system by bypassing security. It discusses the importance of security and impact of ethical hacking on society. Various hacker types like white hat, black hat and grey hat are defined. The document also covers essential terminology related to threats, attacks, vulnerabilities and phases of an attack. It provides examples of reconnaissance and port scanning techniques used in the footprinting phase of a hack.