Module 02: Understanding Cyber Threats, IoCs, and Attack Methodology You do not have access to this note. Post navigationPrevious post: EC-Council Computer Hacking Forensic Investigator (CHFI) | Module 03: Understanding Hard Disks and File SystemsNext post: EC-Council Certified Network Defender (CND) | Module 05: Endpoint Security-Windows Systems