Search Torrents
|
Browse Torrents
|
48 Hour Uploads
|
TV shows
|
Music
|
Top 100
Audio
Video
Applications
Games
Porn
Other
All
Music
Audio books
Sound clips
FLAC
Other
Movies
Movies DVDR
Music videos
Movie clips
TV shows
Handheld
HD - Movies
HD - TV shows
3D
Other
Windows
Mac
UNIX
Handheld
IOS (iPad/iPhone)
Android
Other OS
PC
Mac
PSx
XBOX360
Wii
Handheld
IOS (iPad/iPhone)
Android
Other
Movies
Movies DVDR
Pictures
Games
HD - Movies
Movie clips
Other
E-books
Comics
Pictures
Covers
Physibles
Other
Details for:
Pluralsight - Cybersecurity Threats Ransomware
pluralsight cybersecurity threats ransomware
Type:
E-books
Files:
38
Size:
370.2 MB
Uploaded On:
May 9, 2017, 8:04 a.m.
Added By:
MR-ZOPR
Seeders:
0
Leechers:
1
Info Hash:
CDF36024C8E1F82D1E1F800206F05803CF66C095
Get This Torrent
Type: security-professional Published: Wed Apr 26, 2017 Modified: April 26, 2017 URL: www.pluralsight.com/courses/cybersecurity-threats-ransomware Author: Richard Harpur Duration: 2h 31m Skill: Intermediate
Get This Torrent
1. Course Overview/01. Course Overview.mp4
5.2 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4
49.6 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4
19.3 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4
14.5 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4
14.4 MB
2. What Is Ransomware/07. Ransomware Victims.mp4
11.2 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4
6.1 MB
2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4
5.6 MB
2. What Is Ransomware/02. Overview.mp4
3.9 MB
2. What Is Ransomware/11. Summary.mp4
2.4 MB
2. What Is Ransomware/08. Module Progress Checkpoint.mp4
603.4 KB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4
10.1 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4
6.6 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4
5.9 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4
5.1 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4
3.0 MB
3. Ransomware Entry Points/18. Summary.mp4
2.7 MB
3. Ransomware Entry Points/12. Overview.mp4
2.5 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4
8.6 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4
7.0 MB
4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4
5.1 MB
4. Incident Response - Detection and Containment/19. Overview.mp4
2.5 MB
4. Incident Response - Detection and Containment/23. Summary.mp4
1.6 MB
5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4
68.1 MB
5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4
21.2 MB
5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4
14.4 MB
5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4
6.9 MB
5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4
6.3 MB
5. Incident Response - Eradication and Recovery/31. Summary.mp4
5.8 MB
5. Incident Response - Eradication and Recovery/24. Overview.mp4
5.6 MB
5. Incident Response - Eradication and Recovery/25. Incident Response Lifecycle.mp4
3.5 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4
10.9 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4
10.4 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4
7.6 MB
6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4
5.4 MB
6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4
5.3 MB
6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4
5.2 MB
pctr-xqzt.nfo
1.5 KB
Similar Posts:
Category
Name
Uploaded
E-books
Pluralsight - Cybersecurity Threats Ransomware
Feb. 3, 2023, 6:18 p.m.