#- Acquiring insights to the hacker’s perspective and motivation.
- Applying incident response processes
- Understanding essential SIEM and security functionalities
- Identifying cyber-attacks
- Documentation of cyber-attacks
- Communication with Level 2 and 3, as well as with corporate management
#- Acquiring insights to the hacker’s perspective and motivation.
- Applying incident response processes
- Understanding essential SIEM and security functionalities
- Identifying cyber-attacks
- Doc...
Mehr Informationen