Anatova Ransomware The Anatova ransomware first came to light in 2019 January. It was discovered on a private P2P network, and McAfee detected over 300 instances of the malware worldwide at the time. Anatova’s objective is to encrypt important files and network shares and demanding a cryptocurrency ransom of 10 [...]
Our aim is to give our students hands-on, real-life oriented practical knowledge that can instantly be used by those who play – or wish to play – a role in the security team in an enterprise environment.
Throughout the course we illustrate and analyse the individual steps of the defence procedure through the incident management of a lifelike APT attack – how the subsequent phases are structured, how they interact, and what roles this necessitates on the personnel side. We study in detail the following Blue Team and SOC (Security Operations Center) roles: L1 analyst; Threat intelligence analyst; L2 analyst; Forensics and Network forensics experts; Malware analyst; Threat Hunter; SOC system administrator, coordinator and manager; CISO.