• Overview of key cyber threats and attack vectors
  • Understanding hacker methodologies and motivations
  • Identifying critical assets and infrastructures at risk