SEC504: Hacker Tools, Techniques, and Incident Handling

Analyzes data from multiple sources to prepare environments, respond to information requests, and support intelligence planning and collection requirements.
Identifies collection priorities, develops plans using available assets, and monitors execution to meet operational intelligence requirements.
Evaluates collection strategies, develops and validates requirements, and assesses performance to optimize collection asset effectiveness.
Application penetration testers probe the security integrity of a company’s applications and defenses by evaluating the attack surface of all in-scope vulnerable web-based services, clientside applications, servers-side processes, and more. Mimicking a malicious attacker, app pen testers work to bypass security barriers in order to gain access to sensitive information or enter a company’s internal systems through techniques such as pivoting or lateral movement.
Responsible for accepting system risk on behalf of the organization, ensuring acceptable security levels for mission, reputation, and operations.
This job, which may have varying titles depending on the organization, is often characterized by the breadth of tasks and knowledge required. The all-around defender and Blue Teamer is the person who may be a primary security contact for a small organization, and must deal with engineering and architecture, incident triage and response, security tool administration and more.
Manages an organisation’s cybersecurity strategy and its implementation to ensure that digital systems, services and assets are adequately secure and protected.
Using cloud security solutions to respond to incidents and enable defenses
Designing the adoption of cloud services and define the tools and strategy for cloud solutions