Various tools and tactics for attacking network security monitoring

Differentiate between the various tools and tactics for attacking network security monitoring and the considerations involved in incident response.