cyber-defender-man

Course 6: Detection and Response

Key Skills

Highlight

I investigated a phishing ransomware attack and documented the 5 W’s (Who, What, When, Where, Why) using an incident handler’s journal. I also analyzed a file hash in VirusTotal and documented a response strategy.