Cybersecurity Threats Ransomware

Torrent Details

Cybersecurity Threats RansomwareCybersecurity Threats Ransomware

NAME
Cybersecurity Threats Ransomware.torrent
CATEGORY
eBooks
INFOHASH
4e2321cc86077ed5877514e8473c3457feb8e8d3
SIZE
387 MB in 38 files
ADDED
Uploaded on 28-04-2017 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
01. Course Overview/01. Intro.mp45.2 MB
02. What Is Ransomware/01. Overview.mp43.9 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp419.3 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp414.5 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp45.6 MB
02. What Is Ransomware/05. How Big Is the Problem.mp414.4 MB
02. What Is Ransomware/06. Ransomware Victims.mp411.2 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4603.4 KB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp449.6 MB
02. What Is Ransomware/09. Variations of Ransomware.mp46.1 MB
02. What Is Ransomware/10. Summary.mp42.4 MB
03. Ransomware Entry Points/01. Overview.mp42.5 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp43 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp410.1 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp45.9 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp45.1 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp46.6 MB
03. Ransomware Entry Points/07. Summary.mp42.7 MB
04. Incident Response Detection and Containment/01. Overview.mp42.5 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp45.1 MB
04. Incident Response Detection and Containment/03. Detecting an Attack.mp47 MB
04. Incident Response Detection and Containment/04. Containing the Attack.mp48.6 MB
04. Incident Response Detection and Containment/05. Summary.mp41.6 MB
05. Incident Response Eradication and Recovery/01. Overview.mp45.6 MB
05. Incident Response Eradication and Recovery/02. Incident Response Lifecycle.mp43.5 MB
05. Incident Response Eradication and Recovery/03. Recovery Local and Network Files.mp46.9 MB
05. Incident Response Eradication and Recovery/04. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp414.4 MB
05. Incident Response Eradication and Recovery/05. Tools and Resources.mp46.3 MB
05. Incident Response Eradication and Recovery/06. NoMoreRansom.org.mp468.1 MB
05. Incident Response Eradication and Recovery/07. Paying the Ransom.mp421.2 MB
05. Incident Response Eradication and Recovery/08. Summary.mp45.8 MB
06. Countermeasures and Preparing Your Incident Response/01. Overview.mp45.2 MB
06. Countermeasures and Preparing Your Incident Response/02. Defending a Ransomware Attack.mp410.9 MB
06. Countermeasures and Preparing Your Incident Response/03. Protecting a Windows Network.mp47.6 MB
06. Countermeasures and Preparing Your Incident Response/04. Next Generation Anti-virusAnti-malware.mp45.4 MB
06. Countermeasures and Preparing Your Incident Response/05. Lessons Learned and Your Incident Response Plan.mp410.4 MB
06. Countermeasures and Preparing Your Incident Response/06. Summary.mp45.3 MB
cybersecurity-threats-ransomware.zip16.4 MB

Alternative Torrents for 'Cybersecurity Threats Ransomware'.

There are no alternative torrents found.