Material #4
inMalware Mutiny

A security log analysis challenge for students. It contains four realistic incident logs that require students to identify the malware (Rootkit, Botnet/DDoS, Ransomware, Hijackware) based on behavioral evidence.

Similar Materials