1.1 Explain the importance of system and network architecture concepts in security operations,
1.2 Given a scenario, analyze indicators of potentially malicious activity,
1.3 Given a scenario, use appropriate tools or techniques to determine malicious activity
...