SEC504: Hacker Tools, Techniques, and Incident Handling

Collects and preserves digital evidence using documented techniques to support analytical and investigative objectives in cyber operations.
Develops and evaluates cyber training content and methods to ensure relevance, effectiveness, and alignment with organizational needs.
Designs and delivers cyber training for personnel, ensuring knowledge and readiness in support of evolving cyber domain responsibilities.
Advises on legal issues related to cyber law, providing guidance and recommendations to support compliance and mission legal alignment.
Creates cyberspace strategies and policies that align with mission objectives and support organizational readiness and future initiatives.
Develops workforce plans, policies, and training to align cyberspace personnel with organizational needs and evolving cyber missions.
Sets direction and policies for cyber operations, assumes risk decisions, and aligns mission objectives with available cyber resources.
Investigates cybercrimes, analyzing digital media and logs to establish documentary or physical evidence in support of cyber intrusion cases.
Oversees a portfolio of IT capabilities aligned to enterprise goals, prioritizing needs, solutions, and value delivery to the organization.
Evaluates IT programs for compliance, identifying gaps and ensuring conformance with published tech and security standards and policies.