Best practices for detecting, assessing, reporting, and addressing information security threats Awareness of common information security terms Attacks and Anatomy of Cyber Attacks; Indicators of Cybersecurity Threats and Mitigations Identifying, Responding to and Reporting Cyber Attacks