Choose and apply appropriate strategies for incident response with a team.
Identify and trace malicious behavior by acquiring and analyzing digital data during an investigation using forensically-sound techniques.
Evaluate and articulate the effectiveness of novel tools for the digital forensics or the incident response process.
Create and present templates for and reports of an investigation by applying principles of good forensic documentation.
Identify the nature and activity of files by applying principles of malware analysis.