资源详情

返回首页 | 相关搜索
Pluralsight Cybersecurity Threats Ransomware
大小 370.16 MB
文件数 38
Info Hash: CDF36024C8E1F82D1E1F800206F05803CF66C095
收录时间 2026-02-01 09:16:24
更新时间 2026-02-01 09:16:24
文件列表 (38)
1. Course Overview/01. Course Overview.mp4
5.16 MB
2. What Is Ransomware/09. Demo of Real World Ransomware Attack.mp4
49.6 MB
2. What Is Ransomware/03. Definition and Types of Ransomware.mp4
19.32 MB
2. What Is Ransomware/04. The Ransomware Timeline.mp4
14.5 MB
2. What Is Ransomware/06. How Big Is the Problem.mp4
14.43 MB
2. What Is Ransomware/07. Ransomware Victims.mp4
11.2 MB
2. What Is Ransomware/10. Variations of Ransomware.mp4
6.06 MB
2. What Is Ransomware/05. What Is Ransomware 30,000 ft. View.mp4
5.58 MB
2. What Is Ransomware/02. Overview.mp4
3.88 MB
2. What Is Ransomware/11. Summary.mp4
2.37 MB
2. What Is Ransomware/08. Module Progress Checkpoint.mp4
603.4 KB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4
10.13 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4
6.63 MB
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4
5.88 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4
5.12 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4
3 MB
3. Ransomware Entry Points/18. Summary.mp4
2.72 MB
3. Ransomware Entry Points/12. Overview.mp4
2.54 MB
4. Incident Response - Detection and Containment/22. Containing the Attack.mp4
8.6 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4
7 MB
4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4
5.07 MB
4. Incident Response - Detection and Containment/19. Overview.mp4
2.46 MB
4. Incident Response - Detection and Containment/23. Summary.mp4
1.65 MB
5. Incident Response - Eradication and Recovery/29. NoMoreRansom.org.mp4
68.08 MB
5. Incident Response - Eradication and Recovery/30. Paying the Ransom.mp4
21.24 MB
5. Incident Response - Eradication and Recovery/27. Recovery Cloud Storage Files, Dropbox, and OneDrive.mp4
14.45 MB
5. Incident Response - Eradication and Recovery/26. Recovery Local and Network Files.mp4
6.94 MB
5. Incident Response - Eradication and Recovery/28. Tools and Resources.mp4
6.35 MB
5. Incident Response - Eradication and Recovery/31. Summary.mp4
5.75 MB
5. Incident Response - Eradication and Recovery/24. Overview.mp4
5.6 MB
5. Incident Response - Eradication and Recovery/25. Incident Response Lifecycle.mp4
3.5 MB
6. Countermeasures and Preparing Your Incident Response/33. Defending a Ransomware Attack.mp4
10.87 MB
6. Countermeasures and Preparing Your Incident Response/36. Lessons Learned and Your Incident Response Plan.mp4
10.41 MB
6. Countermeasures and Preparing Your Incident Response/34. Protecting a Windows Network.mp4
7.61 MB
6. Countermeasures and Preparing Your Incident Response/35. Next Generation Anti-virus_Anti-malware.mp4
5.37 MB
6. Countermeasures and Preparing Your Incident Response/37. Summary.mp4
5.28 MB
6. Countermeasures and Preparing Your Incident Response/32. Overview.mp4
5.22 MB
pctr-xqzt.nfo
1.47 KB

免责声明

本网站仅提供DHT网络磁力资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 lulutang@protonmail.com。