This is the first part of a two-part article. The second part will discuss specific topics in more detail, including specific system and network security tools such as network port scanners, OS detection, configuration tools and vulnerability assessment.