This document provides an overview of ethical hacking. It discusses the different types of hackers such as white hat, black hat, and grey hat hackers. It also covers some famous hackers and the tools and skills used in ethical hacking. The document outlines the process of ethical hacking which includes steps like reconnaissance, fingerprinting, sniffing, ARP poisoning, DNS poisoning, and exploitation. It provides examples of techniques like using Metasploit, TCP/IP hijacking, email hijacking, and password hacking. The intended audience are professionals looking to learn about ethical hacking and become ethical hackers.