2.0 Threats, Vulnerabilities, and Mitigation

2.1 Compare and contrast common threat actors and motivations

2.2 Explain common threat vectors and attack surfaces.

2.3 Explain various types of vulnerabilities

2.3 Given a scenario, analyze indicators of malicious activity

2.5 Explain the purpose of mitigation techniques used to secure the enterprise.