Pluralsight Cybersecurity Threats Ransomware
- 收录时间:2018-03-09 00:50:34
- 文件大小:370MB
- 下载次数:189
- 最近下载:2021-01-09 04:23:03
- 磁力链接:
-
文件列表
- 5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4 68MB
- 2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4 50MB
- 5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4 21MB
- 2. What Is Ransomware/03. Definition and Types of Ransomware.mp4 19MB
- 2. What Is Ransomware/04. The Ransomware Timeline.mp4 14MB
- 5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 14MB
- 2. What Is Ransomware/06. How Big Is the Problem.mp4 14MB
- 2. What Is Ransomware/07. Ransomware Victims.mp4 11MB
- 6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4 11MB
- 6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4 10MB
- 3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4 10MB
- 4. Incident Response - Detection and Containment/22. Containing the Attack.mp4 9MB
- 6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4 8MB
- 4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4 7MB
- 5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4 7MB
- 3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4 7MB
- 5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4 6MB
- 2. What Is Ransomware/10. Variations of Ransomware.mp4 6MB
- 3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4 6MB
- 5. Incident Response - Eradication and Recovery/31. Summary.mp4 6MB
- 5. Incident Response - Eradication and Recovery/24. Overview.mp4 6MB
- 2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4 6MB
- 6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4 5MB
- 6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4 5MB
- 6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4 5MB
- 1. Course Overview/01. Course Overview.mp4 5MB
- 3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4 5MB
- 4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4 5MB
- 2. What Is Ransomware/02. Overview.mp4 4MB
- 5. Incident Response - Eradication and Recovery/25. Incident Response Lifecycle.mp4 3MB
- 3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4 3MB
- 3. Ransomware Entry Points/18. Summary.mp4 3MB
- 3. Ransomware Entry Points/12. Overview.mp4 3MB
- 4. Incident Response - Detection and Containment/19. Overview.mp4 2MB
- 2. What Is Ransomware/11. Summary.mp4 2MB
- 4. Incident Response - Detection and Containment/23. Summary.mp4 2MB
- 2. What Is Ransomware/08. Module Progress Checkpoint.mp4 603KB
- pctr-xqzt.nfo 1KB