TorBT - Torrents and Magnet Links Search Engine
[ DevCourseWeb.com ] Udemy - Ransomware Protection + Defense and Response Training
- Date: 2025-05-25
- Size: 323 MB
- Files: 37
File Name
Size
Get Bonus Downloads Here.url
182 B
~Get Your Files Here !/1 - Welcome to Ransomware Protection+/1 -Welcome.mp4
7.2 MB
~Get Your Files Here !/1 - Welcome to Ransomware Protection+/2 -What You’ll Learn in This Course.mp4
9.7 MB
~Get Your Files Here !/10 - Building a Human Firewall – User Awareness and Training/1 -The Role of Employees in Ransomware Prevention.mp4
6.3 MB
~Get Your Files Here !/10 - Building a Human Firewall – User Awareness and Training/2 -Interactive Training and Phishing Simulations.mp4
5.5 MB
~Get Your Files Here !/11 - Advanced Incident Response Planning/1 -Developing a Ransomware-Specific Incident Response Plan.mp4
6.2 MB
~Get Your Files Here !/11 - Advanced Incident Response Planning/2 -Rapid Containment and Analysis.mp4
4.6 MB
~Get Your Files Here !/12 - Legal and Ethical Considerations in Ransomware Response/1 -Understanding Legal Obligations.mp4
5.3 MB
~Get Your Files Here !/12 - Legal and Ethical Considerations in Ransomware Response/2 -Ethical Questions and Decision-Making.mp4
5.7 MB
~Get Your Files Here !/13 - Post-Attack Analysis and Lessons Learned/1 -Conducting a Post-Attack Analysis.mp4
5.2 MB
~Get Your Files Here !/13 - Post-Attack Analysis and Lessons Learned/2 -Improving Your Defense Based on Lessons Learned.mp4
5.1 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/1 -Case Study – WannaCry Ransomware Attack (2017).mp4
18 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/2 -Case Study – NotPetya Ransomware Attack (2017).mp4
14 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/3 -Case Study – Ryuk Ransomware Attack on Hospitals (2018–2020).mp4
13 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/4 -Case Study – Colonial Pipeline Ransomware Attack (2021).mp4
12 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/5 -Case Study – Kaseya VSA Supply Chain Attack (2021).mp4
12 MB
~Get Your Files Here !/14 - Case Studies of Major Ransomware Attacks/6 -Summary of Case Study Learnings.mp4
8.9 MB
~Get Your Files Here !/15 - Conclusion/1 -Key Takeaways and Final Thoughts.mp4
13 MB
~Get Your Files Here !/15 - Conclusion/2 -Thank You for Joining Ransomware Protection+.mp4
11 MB
~Get Your Files Here !/2 - Introduction to Ransomware/1 -What is Ransomware.mp4
11 MB
~Get Your Files Here !/2 - Introduction to Ransomware/2 -Common Attack Vectors.mp4
20 MB
~Get Your Files Here !/2 - Introduction to Ransomware/3 -Ransomware Propagation Methods.mp4
11 MB
~Get Your Files Here !/3 - Identifying and Reducing the Attack Surface/1 -Identity and Access Management (IAM).mp4
13 MB
~Get Your Files Here !/3 - Identifying and Reducing the Attack Surface/2 -Network Infrastructure Hardening.mp4
11 MB
~Get Your Files Here !/4 - Endpoint Hardening and Protection/1 -Segmenting Endpoints.mp4
12 MB
~Get Your Files Here !/4 - Endpoint Hardening and Protection/2 -Remote Desktop Protocol (RDP) Hardening.mp4
13 MB
~Get Your Files Here !/5 - Credential Protection and Privileged Account Security/1 -Reducing Credential Exposure.mp4
8.7 MB
~Get Your Files Here !/5 - Credential Protection and Privileged Account Security/2 -Domain Controller Protection.mp4
8.5 MB
~Get Your Files Here !/6 - Virtualization and Backup Infrastructure Hardening/1 -Securing Virtualization Platforms.mp4
7.9 MB
~Get Your Files Here !/6 - Virtualization and Backup Infrastructure Hardening/2 -Backup Infrastructure Protection.mp4
9.0 MB
~Get Your Files Here !/7 - Detection, Monitoring, and Response Strategies/1 -SIEM and Logging.mp4
8.2 MB
~Get Your Files Here !/7 - Detection, Monitoring, and Response Strategies/2 -Response and Containment Strategies.mp4
7.0 MB
~Get Your Files Here !/8 - Planning and Testing Ransomware Recovery/1 -Developing a Recovery Plan.mp4
5.9 MB
~Get Your Files Here !/8 - Planning and Testing Ransomware Recovery/2 -Drills and Testing.mp4
3.4 MB
~Get Your Files Here !/9 - Threat Intelligence and Ransomware Trends/1 -Understanding Threat Intelligence.mp4
6.6 MB
~Get Your Files Here !/9 - Threat Intelligence and Ransomware Trends/2 -Current Ransomware Trends.mp4
5.3 MB
~Get Your Files Here !/Bonus Resources.txt
386 B