Analyse the critical assets of a company and identify weaknesses and vulnerabilities that lead to intrusion or attack. Apply security detection techniques. Understand cyber attack techniques and implement effective countermeasures.
Data Source: Unified Global Standards (ISCED, ISCO, O*NET, ESCO)