I Hack I Conquer
Ctrl
K
Copy
NCFE L3 Cyber - Assignments and Feedback
UNIT 2 | Threat intelligence in cyber security
10. Describe a range of threat models (AC 2.1)
Previous
9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)
Next
11. Explain the steps within a threat model (AC 2.2)