PART I
Threats, Attacks, and Vulnerabilities
Chapter 1 Malware and Indicators of Compromise
Chapter 2 Attacks
Chapter 3 Threat Actors
Chapter 4 Vulnerability Scanning and Penetration Testing
Chapter 5 Vulnerabilities and Impacts