certified ethical hacker vendor management restructuring planning operations vulnerability management access control cyber security information technology project management installation security analysis encryption vulnerability incident response investigation management leadership upskilling software installation endpoint security patch management lymph nodes window network access control firewall incident management task management business continuity inventory management siem active directory