This document discusses ethical hacking and penetration testing. It begins by defining ethical hacking and why companies hire ethical hackers to test their security systems. It then discusses how to properly plan and conduct penetration tests, including choosing testers, testing frequency, measuring results, and following security policies. Finally, it covers common hacking techniques like denial of service attacks, tools used in ethical hacking, and the goals of information security testing.