CompTIA CySA+ CS0-003 Practice Question
Which attack methodology framework categorizes cyber intrusions into steps such as reconnaissance, weaponization, delivery, exploitation, installation, command and control, and actions on objectives?
Open Source Security Testing Methodology Manual
Cyber kill chain
MITRE ATT&CK
Diamond Model of Intrusion Analysis