1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes....
Lesson 1: Definition & History of Qualitative Research, Lesson 2: The Common Characteristics Of Qualitative Research, Lesson 4: Social Science Research/Philosophical and Interpretive Framework