Threats and Attacks
• 1.1 Recognize the different types of attacks
o 1.1.1 Differentiate between exploits and malware
o 1.1.2 Define a file-less attack
o 1.1.3 Define a supply chain attack
o 1.1.4 Outline ransomware threats
• 1.2 Recognize common attack tactics
o 1.2.1 List common attack tactics
o 1.2.2 Define various attack tactics
o 1.2.3 Outline MITRE framework steps
• 1.3 Recognize various types of threats/vulnerabilities
o 1.3.1 Differentiate between threats and attacks
o 1.3.2 Define product modules that help identify threats
o 1.3.3 Identify legitimate threats (true positives) vs. illegitimate threats (false positives)
o 1.3.4 Summarize the generally available references for vulnerabilities