Previous Lecture Complete and continue  

  1.3 Security in Action: Malware IOC