Description:
This lesson discusses the history and characteristics of the cyber environment. It also describes methods for implementing attacks through and techniques and procedures for securing the cyber environment.
Objectives:
RECALL history and characteristics of the cyber environment.
RECALL methods for implementing attacks through the cyber environment.
RECALL techniques and procedures for securing the cyber environment.