This document outlines an industrial training report on ethical hacking conducted at Alison Online Training Institute. It begins with an introduction to ethical hacking and the different types of hacking. It then discusses the role of security and penetration testers and different penetration testing methodologies. The document provides an overview of what can and cannot be done legally as an ethical hacker. It also discusses the basics of networking and what it takes to be a successful security tester.