This document provides an overview of module 1 of a cybersecurity training course. The module objectives are to explain why networks and data are attacked and to describe the motivations and potential impacts of attacks. It discusses how threat actors like hackers, organized crime groups, and state-sponsored groups attack individuals, companies, and nations to steal information, money, and trade secrets. Specific attack types covered include rogue wireless hotspots, ransomware, and sophisticated malware targeted at infrastructure. The impacts of attacks include theft of personally identifiable information, lost competitive advantage from stolen intellectual property, and disruption of economic and political systems through cyber attacks.