SEC504: Hacker Tools, Techniques, and Incident Handling

Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.
Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.
This expert applies digital forensic skills to a plethora of media that encompass an investigation. The practice of being a digital forensic examiner requires several skill sets, including evidence collection, computer, smartphone, cloud, and network forensics, and an investigative mindset. These experts analyze compromised systems or digital media involved in an investigation that can be used to determine what really happened. Digital media contain footprints that physical forensic data and the crime scene may not include.
Ensure the cybercriminal investigation reveals all digital evidence to prove the malicious activity.
Develops business and IT process architectures, creating baseline and target architectures to meet mission or enterprise goals.
Responsible for developing and maintaining business, systems, and information processes to support enterprise mission needs. Develops technology rules and requirements that describe baseline and target architectures.
Sets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.
Responsible for establishing vision and direction for an organization's cybersecurity operations and resources and their impact on digital and physical spaces. Possesses authority to make and execute decisions that impact an organization broadly, including policy approval and stakeholder engagement.
Collaborates to identify access and collection gaps using cyber resources and techniques to penetrate target networks and support mission operations.