An explanation of attacker methodology
Descriptions of common attacks
How to categorize threats
How to identify and counter threats at the network, host, and application levels