Since we can’t make image posts, here’s a link to a [finished version](https://i.imgur.com/sxhfl8z.png) of this diagram (you’ll need to zoom in to see it clearly). Here’s a [download link](https://onedrive.live.com/?cid=A1C66391372106FE&id=A1C66391372106FE%217899) (onedrive) for the source Draw.io file so anyone can derive from / edit it for their needs. Feel free to share / use it without attribution.
I posted an [earlier draft of this](https://www.reddit.com/r/lowlevel/comments/qjtah1/i_attempted_to_diagram_everything_ive_learned/) over on r/lowlevel for peer review and they seemed to believe it to be accurate. So, for any of you out there looking to better understand the problem-set of endpoint threat recognition on a fundamental level, you might find this helpful. It’s an attempt at taking a very nebulous topic and break it down into a series of more digestible concepts.