1.0 Threats, Attacks, and Vulnerabilites
1.1 Compare and contrast different types of social engineering techniques.
1.2 Given a scenario, analyze potential indicators to derermine the type of attack.
1.3 Given a scenario, analyze potential indicators associated with application attacks.
1.4 Given a scenario, analyze potential indicators associated with network attacks.
1.5 Explain the different threat actors, vectors, and intelligence sources.
1.6 Explain the security concerns associated with various types of vulnerabilities.
1.7 Summarize the techniques used in security assessments.
1.8 Explain the techniques used in penetration testing.