1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.,
1.2 Compare and contrast types of attacks.,
1.3 Explain threat actor types and attributes.
...
MD1 Event and incident detection: Security as a mindset,
MD1 Data and Asset classification,
MD1 Your impact on data protection: Detect and protect without neglect
...