The document discusses ethical hacking. It outlines the agenda which includes defining ethical hacking, types of hackers and hacking, goals of ethical hacking, security threats and types of threats, preventive measures, phases of ethical hacking, and ethical hacking tools. It defines ethical hacking as finding vulnerabilities in a system to gain unauthorized access for malicious activities or sensitive information theft. The types of hackers covered are white hat, black hat, and grey hat hackers. The goals of ethical hacking are also discussed. Security threats can potentially harm computer systems and include physical and non-physical threats. Organizations need logical and cognitive security measures like user IDs, passwords, biometrics, and efficient intrusion detection systems.