Previous Lecture Complete and continue  

  1.1 Understanding the New Security Threat Landscape and the Attack Continuum