Lesson 2.1: The Attacker’s Steps – Phases of an Ethical Hack
Lesson 2.2: Lockheed Martin’s Cyber Kill Chain® – A Seven-Step Attack Model
Lesson 2.3: Mapping Attacks to Defenses – MITRE ATT&CK and Frameworks