1.1 Given a scenario, analyze indicators of compromise and determine the type of malware.,
1.2 Compare and contrast types of attacks.,
1.3 Explain threat actor types and attributes.
...
1.1 – Given a scenario, install and configure laptop hardware and components,
1.2 – Given a scenario, install components within the display of a laptop,
1.3 – Given a scenario, use appropriate laptop features
...