Techniques used by professional Cyber Security TeamTechniques used by professional Cyber Security Team