Achieve a path through the cyber kill chain by understanding the anatomy of a cyber attack and strategies used by cyber-criminals.