2.0 - Threats, Vulnerabilities, and Mitigations
2.1 - Compare and contract common threat actors and motivations.
2.2 - Explain common threat vectors and attack surfaces
2.3 - Explain various types of vulnerabilities
2.4 - Given a scenario, analyze indicators of malicious activity
2.5 - Explain the purpose of mitigation techniques used to secure the enterprise.