Pluralsight - Cybersecurity Threats: Ransomware
370.16 MB
Total Size
37
Files
June
Created
2
Seeders
0
Leechers
Basic Info
Hash: 159c05a9fdac065804ed4bffc85d36ad705ad605
File Status: Multi-file
Type: Public
File List (37 Files)
3. Ransomware Entry Points/15. Embedded Hyperlinks, Websites_downloads, and Drive-by Infections.mp4
#1•
MP4
5.88 MB
3. Ransomware Entry Points/16. Why Common Exploit Kits Are Used.mp4
#2•
MP4
5.12 MB
3. Ransomware Entry Points/14. Phishing and Email Attachments.mp4
#3•
MP4
10.13 MB
3. Ransomware Entry Points/18. Summary.mp4
#4•
MP4
2.72 MB
3. Ransomware Entry Points/12. Overview.mp4
#5•
MP4
2.54 MB
3. Ransomware Entry Points/13. The 5 Classic Infection Vectors.mp4
#6•
MP4
3 MB
3. Ransomware Entry Points/17. Command and Callback (C&C) and Indicators of Compromise.mp4
#7•
MP4
6.63 MB
4. Incident Response - Detection and Containment/21. Detecting an Attack.mp4
#8•
MP4
7 MB
4. Incident Response - Detection and Containment/20. Indicators of Compromise.mp4
#9•
MP4
5.07 MB
4. Incident Response - Detection and Containment/23. Summary.mp4
#10•
MP4
1.65 MB