Lecture 03: Understanding Cyber Kill Chain - Delivery, Exploitation, and Installation | COFYT