This document provides an overview of ethical hacking. It begins with an introduction that defines ethical hacking as legal penetration testing by independent computer security professionals who evaluate target system security without damaging systems or stealing information. It then covers types of hackers (black hat, white hat, grey hat), why hackers hack, required skills for ethical hackers, hacking processes like footprinting and scanning, and what hackers may do after hacking like patching vulnerabilities. The document also discusses advantages and disadvantages of ethical hacking as well as future enhancements and concludes with a thank you.