-
1.1 Compare and contrast different types of social engineering techniques
-
1.2 Given a scenario, analyze potential indicators to determine the type of attack
-
1.3 Given a scenario, analyze potential indicators associated with application attacks
-
1.4 Given a scenario, analyze potential indicators associated with network attacks