To enhance professionals with the ability to improve risk assessments using ethical hacking, analyze personas of malicious hackers, utilize ethical hacking techniques to test perimeter defense, accurately document ethical hacking activities and findings, and design and manage ethical hacking organizations.