2.1 Compare and contrast common threat actors and motivations. 2.2 Explain common threat vectors and attack surfaces. 2.3 Explain various types of vulnerabilities. 2.4 Given a scenario, analyze indicators of malicious activity 2.5 Explain the purpose of mitigation techniques used to secure the enterprise.