This material was originally created to go along with a community cybersecurity training conference. The PowerPoint used can be found here