This course has already ended.

Malware Response

Disruption of Malware Operations

Evasion and Countermeasures

Attribution

Evasion and Countermeasures part 2

Posting submission...