bars
I Hack I Conquer
search
circle-xmark
⌘
Ctrl
k
copy
Copy
chevron-down
NCFE L3 Cyber - Assignments and Feedback
chevron-right
UNIT 2 | Threat intelligence in cyber security
10. Describe a range of threat models (AC 2.1)
Previous
9. Analyse relevant cyber threat intelligence information requirements for an organisation (AC 1.9)
chevron-left
Next
11. Explain the steps within a threat model (AC 2.2)
chevron-right