Skip to content
Skip to main content

About this free course

Author

Download this course

Share this free course

Learning from major cyber security incidents
Learning from major cyber security incidents

Start this free course now. Just create an account and sign in. Enrol and complete the course for a free statement of participation or digital badge if available.

Described image
Figure 2  (a) The desktop background image showing the instruction to open ‘Wana Decrypt0r’; (b) the interface of Wana Decrypt0r 2.0

 2.2 How did it work?