PART I

Threats, Attacks, and Vulnerabilities

Images Chapter 1    Malware and Indicators of Compromise

Images Chapter 2    Attacks

Images Chapter 3    Threat Actors

Images Chapter 4    Vulnerability Scanning and Penetration Testing

Images Chapter 5    Vulnerabilities and Impacts