Statements (50)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:hospital
|
gptkbp:bfsLayer |
6
|
gptkbp:bfsParent |
gptkb:The_Great_War_(1959)
|
gptkbp:certification |
gptkb:Certified_Ethical_Hacker_(CEH)
gptkb:Comp_TIA_Security+ gptkb:Certified_Information_Security_Manager_(CISM) gptkb:Certified_Information_Systems_Security_Professional_(CISSP) |
gptkbp:collaborates_with |
gptkb:software
System Administrators Compliance Officers Network Engineers Legal Teams |
gptkbp:employs |
gptkb:software
Growing Penetration Testing |
https://www.w3.org/2000/01/rdf-schema#label |
Cybersecurity Technician
|
gptkbp:involves |
Developing Security Policies
Analyzing Security Incidents Maintaining Security Documentation Training Staff on Security Practices Conducting Forensic Investigations |
gptkbp:is_used_for |
gptkb:XMPP_Extension_Protocol
gptkb:Cloud_Computing_Service Security Tools Threat Intelligence Platforms Malware Analysis Tools |
gptkbp:operates_in |
gptkb:government_agency
gptkb:financial_services_company gptkb:Company gptkb:Educational_Institution Finance Healthcare Corporate Sector |
gptkbp:prize_money |
$50,000 -$100,000
|
gptkbp:responsible_for |
Monitoring Security Systems
Implementing Security Measures Responding to Security Breaches Conducting Security Audits |
gptkbp:skills |
gptkb:software
Bachelor's Degree Incident Response Information Security Vulnerability Assessment |
gptkbp:works_with |
gptkb:virus
gptkb:software Firewalls Intrusion Detection Systems Encryption Tools Security Information and Event Management (SIEM) Systems Identity and Access Management (IAM) Systems |