Students review the OSI model to map specific security threats to layers and identify potential entry points for attackers in a network topology.

Similar Lessons