Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus

Torrent Details

Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And PegasusUdemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus

NAME
Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus.torrent
CATEGORY
Other
INFOHASH
1cda1b1b06b2f8e5e81b162ed1b18e990888b5e3
SIZE
691 MB in 94 files
ADDED
Uploaded on 28-08-2023 by our crawler pet called "Spidey".
SWARM
0 seeders & 0 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

[ DevCourseWeb.com ] Cyber Security Case Studies: Stuxnet, Wannacry, And Pegasus



If You Need More Stuff, kindly Visit and Support Us -->> https://DevCourseWeb.com







Published 8/2023

MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz

Language: English | Size: 691.11 MB | Duration: 2h 4m



Understanding End-to-End Cyber Attack Architectures for Enhanced Security Awareness



What you'll learn

Case studies detailing motivation, attacker, end-to-end architecture and consequences of the attack

Stuxnet Worm

WannaCry Ransomware

Pegasus Spyware



Requirements

Basic understanding of computer technologies

Basic understanding of security concepts like encryption

Curiosity about cyber security



If You Need More Stuff, kindly Visit and Support Us -->> https://CourseWikia.com



Get More Tutorials and Support Us -->> https://FreeCourseWeb.com



We upload these learning materials for the people from all over the world, who have the talent and motivation to sharpen their skills/ knowledge but do not have the financial support to afford the materials. If you like this content and if you are truly in a position that you can actually buy the materials, then Please, we repeat, Please, Support Authors. They Deserve it! Because always remember, without "Them", you and we won't be here having this conversation. Think about it! Peace...



Image error



Image error

Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
~Get Your Files Here !/1 - Getting Started/1 - Introduction English.vtt6.8 KB
~Get Your Files Here !/1 - Getting Started/1 - Introduction.mp433.9 MB
~Get Your Files Here !/1 - Getting Started/2 - How to Get Most Out of Course English.vtt806 B
~Get Your Files Here !/1 - Getting Started/2 - How to Get Most Out of Course.mp41.5 MB
~Get Your Files Here !/2 - Stuxnet/1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html309 B
~Get Your Files Here !/2 - Stuxnet/10 - Compromising Step 7 Software on Windows Field PGs English.vtt2.9 KB
~Get Your Files Here !/2 - Stuxnet/10 - Compromising Step 7 Software on Windows Field PGs.mp413.5 MB
~Get Your Files Here !/2 - Stuxnet/11 - Altering Centrifuge Operations English.vtt994 B
~Get Your Files Here !/2 - Stuxnet/11 - Altering Centrifuge Operations.mp44.6 MB
~Get Your Files Here !/2 - Stuxnet/12 - Stuxnet Command and Control English.vtt948 B
~Get Your Files Here !/2 - Stuxnet/12 - Stuxnet Command and Control.mp44.8 MB
~Get Your Files Here !/2 - Stuxnet/13 - Updating Stuxnet through RPC English.vtt2.7 KB
~Get Your Files Here !/2 - Stuxnet/13 - Updating Stuxnet through RPC.mp411.3 MB
~Get Your Files Here !/2 - Stuxnet/14 - Detection of Stuxnet English.vtt3 KB
~Get Your Files Here !/2 - Stuxnet/14 - Detection of Stuxnet.mp420.9 MB
~Get Your Files Here !/2 - Stuxnet/15 - Stuxnet Spin Offs English.vtt3.3 KB
~Get Your Files Here !/2 - Stuxnet/15 - Stuxnet Spin Offs.mp413 MB
~Get Your Files Here !/2 - Stuxnet/16 - Final Thoughts on Stuxnet English.vtt1.3 KB
~Get Your Files Here !/2 - Stuxnet/16 - Final Thoughts on Stuxnet.mp45.6 MB
~Get Your Files Here !/2 - Stuxnet/3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure English.vtt3 KB
~Get Your Files Here !/2 - Stuxnet/3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp411.4 MB
~Get Your Files Here !/2 - Stuxnet/4 - Motivation behind Stuxnet English.vtt2.1 KB
~Get Your Files Here !/2 - Stuxnet/4 - Motivation behind Stuxnet.mp418.6 MB
~Get Your Files Here !/2 - Stuxnet/5 - Normal Operations at the Nuclear Plant English.vtt2.9 KB
~Get Your Files Here !/2 - Stuxnet/5 - Normal Operations at the Nuclear Plant.mp48.8 MB
~Get Your Files Here !/2 - Stuxnet/6 - Stuxnet Attack Overview English.vtt2.3 KB
~Get Your Files Here !/2 - Stuxnet/6 - Stuxnet Attack Overview.mp48 MB
~Get Your Files Here !/2 - Stuxnet/7 - Entering the Facility by Compromising Initial Systems English.vtt4.4 KB
~Get Your Files Here !/2 - Stuxnet/7 - Entering the Facility by Compromising Initial Systems.mp420 MB
~Get Your Files Here !/2 - Stuxnet/8 - Finding Field PGs with Network Propagation Techniques English.vtt3.4 KB
~Get Your Files Here !/2 - Stuxnet/8 - Finding Field PGs with Network Propagation Techniques.mp417.5 MB
~Get Your Files Here !/2 - Stuxnet/9 - Spreading through Infected USB Drives English.vtt3.2 KB
~Get Your Files Here !/2 - Stuxnet/9 - Spreading through Infected USB Drives.mp418.2 MB
~Get Your Files Here !/3 - WannaCry/17 - What is a Ransomware English.vtt3.7 KB
~Get Your Files Here !/3 - WannaCry/17 - What is a Ransomware.mp428.6 MB
~Get Your Files Here !/3 - WannaCry/18 - Evolution of Ransomware English.vtt8.6 KB
~Get Your Files Here !/3 - WannaCry/18 - Evolution of Ransomware.mp427.2 MB
~Get Your Files Here !/3 - WannaCry/19 - Modern Ransomware Impact English.vtt2.8 KB
~Get Your Files Here !/3 - WannaCry/19 - Modern Ransomware Impact.mp410.4 MB
~Get Your Files Here !/3 - WannaCry/2 - The WannaCry Ransomware Quiz.html587 B
~Get Your Files Here !/3 - WannaCry/20 - Introduction to WannaCry Ransomware English.vtt3.3 KB
~Get Your Files Here !/3 - WannaCry/20 - Introduction to WannaCry Ransomware.mp421.2 MB
~Get Your Files Here !/3 - WannaCry/21 - WannaCry Components English.vtt1.9 KB
~Get Your Files Here !/3 - WannaCry/21 - WannaCry Components.mp410.3 MB
~Get Your Files Here !/3 - WannaCry/22 - The Kill Switch English.vtt2.4 KB
~Get Your Files Here !/3 - WannaCry/22 - The Kill Switch.mp48.4 MB
~Get Your Files Here !/3 - WannaCry/23 - Starting the Windows Service English.vtt1.9 KB
~Get Your Files Here !/3 - WannaCry/23 - Starting the Windows Service.mp46.9 MB
~Get Your Files Here !/3 - WannaCry/24 - Unload Resources used in the Attack English.vtt3.7 KB
~Get Your Files Here !/3 - WannaCry/24 - Unload Resources used in the Attack.mp419.1 MB
~Get Your Files Here !/3 - WannaCry/25 - Decrypting the Encrypted DLL Component English.vtt2.4 KB
~Get Your Files Here !/3 - WannaCry/25 - Decrypting the Encrypted DLL Component.mp410.8 MB
~Get Your Files Here !/3 - WannaCry/26 - Key Generation and Encryption of User Files English.vtt3.9 KB
~Get Your Files Here !/3 - WannaCry/26 - Key Generation and Encryption of User Files.mp420.8 MB
~Get Your Files Here !/3 - WannaCry/27 - What does WannaCry Encrypt English.vtt1.7 KB
~Get Your Files Here !/3 - WannaCry/27 - What does WannaCry Encrypt.mp412.9 MB
~Get Your Files Here !/3 - WannaCry/28 - Additional Processes in the Attack English.vtt2.1 KB
~Get Your Files Here !/3 - WannaCry/28 - Additional Processes in the Attack.mp413.2 MB
~Get Your Files Here !/3 - WannaCry/29 - Increasing Impact and Preventing Recovery English.vtt1.3 KB
~Get Your Files Here !/3 - WannaCry/29 - Increasing Impact and Preventing Recovery.mp410.5 MB
~Get Your Files Here !/3 - WannaCry/30 - Unveiling Command and Control Communication English.vtt2.8 KB
~Get Your Files Here !/3 - WannaCry/30 - Unveiling Command and Control Communication.mp421.5 MB
~Get Your Files Here !/3 - WannaCry/31 - How much money did attackers collect English.vtt2.4 KB
~Get Your Files Here !/3 - WannaCry/31 - How much money did attackers collect.mp422.3 MB
~Get Your Files Here !/3 - WannaCry/32 - Why is the data not Recoverable English.vtt2.3 KB
~Get Your Files Here !/3 - WannaCry/32 - Why is the data not Recoverable.mp411.7 MB
~Get Your Files Here !/3 - WannaCry/33 - The Worm Component Propagation of WannaCry English.vtt2.6 KB
~Get Your Files Here !/3 - WannaCry/33 - The Worm Component Propagation of WannaCry.mp413.5 MB
~Get Your Files Here !/3 - WannaCry/34 - Preventing WannaCry Safeguarding Your Systems English.vtt3 KB
~Get Your Files Here !/3 - WannaCry/34 - Preventing WannaCry Safeguarding Your Systems.mp414.8 MB
~Get Your Files Here !/3 - WannaCry/35 - Final Thoughts on WannaCry English.vtt692 B
~Get Your Files Here !/3 - WannaCry/35 - Final Thoughts on WannaCry.mp45.7 MB
~Get Your Files Here !/4 - Pegasus/3 - Pegasus Quiz.html300 B
~Get Your Files Here !/4 - Pegasus/36 - What is Spyware English.vtt6.8 KB
~Get Your Files Here !/4 - Pegasus/36 - What is Spyware.mp445.7 MB
~Get Your Files Here !/4 - Pegasus/37 - Introduction to Pegasus Spyware English.vtt4.9 KB
~Get Your Files Here !/4 - Pegasus/37 - Introduction to Pegasus Spyware.mp429.5 MB
~Get Your Files Here !/4 - Pegasus/38 - Pegasus Device Infection English.vtt3.5 KB
~Get Your Files Here !/4 - Pegasus/38 - Pegasus Device Infection.mp49 MB
~Get Your Files Here !/4 - Pegasus/39 - Device Exploit Trident Vulnerability English.vtt5.5 KB
~Get Your Files Here !/4 - Pegasus/39 - Device Exploit Trident Vulnerability.mp420.4 MB
~Get Your Files Here !/4 - Pegasus/40 - Agent Installation and Persistence English.vtt2.4 KB
~Get Your Files Here !/4 - Pegasus/40 - Agent Installation and Persistence.mp412.2 MB
~Get Your Files Here !/4 - Pegasus/41 - User Device and Surveillance English.vtt3.8 KB
~Get Your Files Here !/4 - Pegasus/41 - User Device and Surveillance.mp419.6 MB
~Get Your Files Here !/4 - Pegasus/42 - Data Exfiltration to Command and Control English.vtt2.2 KB
~Get Your Files Here !/4 - Pegasus/42 - Data Exfiltration to Command and Control.mp413 MB
~Get Your Files Here !/4 - Pegasus/43 - Pegasus Abuse English.vtt1.9 KB
~Get Your Files Here !/4 - Pegasus/43 - Pegasus Abuse.mp420.9 MB
~Get Your Files Here !/4 - Pegasus/44 - Final Thoughts on Pegasus English.vtt1.7 KB
~Get Your Files Here !/4 - Pegasus/44 - Final Thoughts on Pegasus.mp49.5 MB
~Get Your Files Here !/5 - Wrap Up/45 - Course Summary English.vtt2.1 KB
~Get Your Files Here !/5 - Wrap Up/45 - Course Summary.mp49.7 MB
~Get Your Files Here !/Bonus Resources.txt386 B

Alternative Torrents for 'Udemy Cyber Security Case Studies Stuxnet Wannacry And Pegasus'.

There are no alternative torrents found.