1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.,
1.2 Compare and contrast types of attacks.,
1.3 Explain threat actor types and attributes.
...
Chapter 1 (“Accounting: The Language of Business”),
Chapter 2 (“Analyzing Business Transactions”),
Chapter 3 (“Analyzing Business Transactions Using T Accounts”)
...