I had the initiative to create this course to teach a landing on what a real ransomware attack process looks like, using well-known tools used by notorious groups, let’s learn about the most famous groups,
accessing sites where stolen data is put for download by several different groups, let’s...