Introduction to ethical hacking, including methodologies, tools, and the importance of authorization.