The document introduces the speaker, Jayson E. Street, and discusses applying ancient military strategy from Sun Tzu's The Art of War to modern cybersecurity penetration testing. It outlines a 5-point methodology for recon, scanning, exploring, exploiting, and cleaning up. Several specific reconnaissance, scanning, and exploitation tools will be covered during the training, with the goal of teaching students to think strategically about locating vulnerabilities rather than just following scripts or powerpoints. The rest of the class will depend on how much effort students put in.