zhongziso种子搜
首页
功能
磁力转BT
BT转磁力
使用教程
免责声明
关于
zhongziso
搜索
Cybersecurity Threats Ransomware
magnet:?xt=urn:btih:4e2321cc86077ed5877514e8473c3457feb8e8d3&dn=Cybersecurity Threats Ransomware
磁力链接详情
Hash值:
4e2321cc86077ed5877514e8473c3457feb8e8d3
点击数:
105
文件大小:
370.16 MB
文件数量:
37
创建日期:
2017-6-5 02:01
最后访问:
2024-10-25 08:24
访问标签:
Cybersecurity
Threats
Ransomware
文件列表详情
01. Course Overview/01. Intro.mp4 5.16 MB
02. What Is Ransomware/01. Overview.mp4 3.88 MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp4 19.32 MB
02. What Is Ransomware/03. The Ransomware Timeline.mp4 14.5 MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp4 5.58 MB
02. What Is Ransomware/05. How Big Is the Problem.mp4 14.43 MB
02. What Is Ransomware/06. Ransomware Victims.mp4 11.2 MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4 603.4 KB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp4 49.6 MB
02. What Is Ransomware/09. Variations of Ransomware.mp4 6.06 MB
02. What Is Ransomware/10. Summary.mp4 2.37 MB
03. Ransomware Entry Points/01. Overview.mp4 2.54 MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp4 3 MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp4 10.13 MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp4 5.88 MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp4 5.12 MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp4 6.63 MB
03. Ransomware Entry Points/07. Summary.mp4 2.72 MB
04. Incident Response Detection and Containment/01. Overview.mp4 2.46 MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp4 5.07 MB
04. Incident Response Detection and Containment/03. Detecting an Attack.mp4 7 MB
04. Incident Response Detection and Containment/04. Containing the Attack.mp4 8.6 MB
04. Incident Response Detection and Containment/05. Summary.mp4 1.65 MB
05. Incident Response Eradication and Recovery/01. Overview.mp4 5.6 MB
05. Incident Response Eradication and Recovery/02. Incident Response Lifecycle.mp4 3.5 MB
05. Incident Response Eradication and Recovery/03. Recovery Local and Network Files.mp4 6.94 MB
05. Incident Response Eradication and Recovery/04. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4 14.45 MB
05. Incident Response Eradication and Recovery/05. Tools and Resources.mp4 6.35 MB
05. Incident Response Eradication and Recovery/06. NoMoreRansom.org.mp4 68.08 MB
05. Incident Response Eradication and Recovery/07. Paying the Ransom.mp4 21.24 MB
05. Incident Response Eradication and Recovery/08. Summary.mp4 5.75 MB
06. Countermeasures and Preparing Your Incident Response/01. Overview.mp4 5.22 MB
06. Countermeasures and Preparing Your Incident Response/02. Defending a Ransomware Attack.mp4 10.87 MB
06. Countermeasures and Preparing Your Incident Response/03. Protecting a Windows Network.mp4 7.61 MB
06. Countermeasures and Preparing Your Incident Response/04. Next Generation Anti-virusAnti-malware.mp4 5.37 MB
06. Countermeasures and Preparing Your Incident Response/05. Lessons Learned and Your Incident Response Plan.mp4 10.41 MB
06. Countermeasures and Preparing Your Incident Response/06. Summary.mp4 5.28 MB
其他位置