Chapter 1: South African general business environment, Chapter 2: South African socio-economic conditions, Chapter 3: South African specific products...
1.1 Given a scenario, analyze indicators of compromise and determine the type of malware., 1.2 Compare and contrast types of attacks., 1.3 Explain threat actor types and attributes....