This course has already ended.

Models to Understand Malicious Operations

Attack trees

Kill Chains

Attack Attribution

Posting submission...