2.Investigate a Threat Landscape | Cybersecurity Essentials Lab