-
1.1 Compare and contrast different types of social engineering techniques
-
1.2 Given a scenario, analyze potential indicators to determine the type of attack
-
1.3 Given a scenario, analyze potential indicators associated with application attacks
-
1.4 Given a scenario, analyze potential indicators associated with network attacks
-
1.5 Explain different threat actors, vectors, and intelligence sources
-
1.6 Explain the security concerns associated with various types of vulnerabilities