Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.