Chapter Title
Related domains:
2.0 Threats, Vulnerabilities, and Mitigations 22%
Related sub-domains
2.2 Explain common threat vectors and attack surfaces. 2.4 Given a scenario, analyze indicators of malicious activity
TODO: Write some more up on this chapter, then take the practice test
social engineering key principles social engineering techniques TRUST Model password attacks