Warning: This course intentionally includes a virus file as part of the learning material since the course deals with security issues.
Key Features
- Understand modern human-operated cyber attacks, focusing on threat actor tactics, techniques, and procedures
- Collect and analyze ransomware-related cyber threat intelligence from various sources
- Use forensic methods and tools to reconstruct ransomware attacks and prevent them in the early stages
Who this book is for
This book is for security researchers, security analysts, or anyone in the incident response landscape who is responsible for building an incident response model for ransomware attacks. A basic understanding of cyber threats will be helpful to get the most out of this book.