3.3.1.9 Lab - Detecting Threats and Vulnerabilities