Module 2 – Understanding Cyber Threats, IoCs, and Attack Methodology