2.0 - Threats, Vulnerabilities, and Mitigations

2.1 - Compare and contract common threat actors and motivations.

2.2 - Explain common threat vectors and attack surfaces

2.3 - Explain various types of vulnerabilities

2.4 - Given a scenario, analyze indicators of malicious activity

2.5 - Explain the purpose of mitigation techniques used to secure the enterprise.