1A: Compare and Contrast Information Security Roles, 1B: Compare and Contrast Security Control and Framework Types, 2A: Explain Threat Actor Types and Attack Vectors...
1.1 - Explain the purposes and uses of ports and protocols, 1.2 - Explain devices, applications, protocols and services at their appropriate OSI layers., 1.3 - Explain the concepts and characteristics of routing and switching.