种子简介
种子名称:
Cybersecurity Threats Ransomware
文件类型:
视频
文件数目:
37个文件
文件大小:
370.16 MB
收录时间:
2017-6-5 02:01
已经下载:
3次
资源热度:
108
最近下载:
2024-11-15 09:46
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:4e2321cc86077ed5877514e8473c3457feb8e8d3&dn=Cybersecurity Threats Ransomware
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Cybersecurity Threats Ransomware.torrent
01. Course Overview/01. Intro.mp45.16MB
02. What Is Ransomware/01. Overview.mp43.88MB
02. What Is Ransomware/02. Definition and Types of Ransomware.mp419.32MB
02. What Is Ransomware/03. The Ransomware Timeline.mp414.5MB
02. What Is Ransomware/04. What Is Ransomware 30,000 ft. View.mp45.58MB
02. What Is Ransomware/05. How Big Is the Problem.mp414.43MB
02. What Is Ransomware/06. Ransomware Victims.mp411.2MB
02. What Is Ransomware/07. Module Progress Checkpoint.mp4603.4KB
02. What Is Ransomware/08. Demo of Real World Ransomware Attack.mp449.6MB
02. What Is Ransomware/09. Variations of Ransomware.mp46.06MB
02. What Is Ransomware/10. Summary.mp42.37MB
03. Ransomware Entry Points/01. Overview.mp42.54MB
03. Ransomware Entry Points/02. The 5 Classic Infection Vectors.mp43MB
03. Ransomware Entry Points/03. Phishing and Email Attachments.mp410.13MB
03. Ransomware Entry Points/04. Embedded Hyperlinks, Websitesdownloads, and Drive-by Infections.mp45.88MB
03. Ransomware Entry Points/05. Why Common Exploit Kits Are Used.mp45.12MB
03. Ransomware Entry Points/06. Command and Callback (C&C) and Indicators of Compromise.mp46.63MB
03. Ransomware Entry Points/07. Summary.mp42.72MB
04. Incident Response Detection and Containment/01. Overview.mp42.46MB
04. Incident Response Detection and Containment/02. Indicators of Compromise.mp45.07MB
04. Incident Response Detection and Containment/03. Detecting an Attack.mp47MB
04. Incident Response Detection and Containment/04. Containing the Attack.mp48.6MB
04. Incident Response Detection and Containment/05. Summary.mp41.65MB
05. Incident Response Eradication and Recovery/01. Overview.mp45.6MB
05. Incident Response Eradication and Recovery/02. Incident Response Lifecycle.mp43.5MB
05. Incident Response Eradication and Recovery/03. Recovery Local and Network Files.mp46.94MB
05. Incident Response Eradication and Recovery/04. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp414.45MB
05. Incident Response Eradication and Recovery/05. Tools and Resources.mp46.35MB
05. Incident Response Eradication and Recovery/06. NoMoreRansom.org.mp468.08MB
05. Incident Response Eradication and Recovery/07. Paying the Ransom.mp421.24MB
05. Incident Response Eradication and Recovery/08. Summary.mp45.75MB
06. Countermeasures and Preparing Your Incident Response/01. Overview.mp45.22MB
06. Countermeasures and Preparing Your Incident Response/02. Defending a Ransomware Attack.mp410.87MB
06. Countermeasures and Preparing Your Incident Response/03. Protecting a Windows Network.mp47.61MB
06. Countermeasures and Preparing Your Incident Response/04. Next Generation Anti-virusAnti-malware.mp45.37MB
06. Countermeasures and Preparing Your Incident Response/05. Lessons Learned and Your Incident Response Plan.mp410.41MB
06. Countermeasures and Preparing Your Incident Response/06. Summary.mp45.28MB