Learning Ransomware Countermeasures\1.Introduction\02.What you need to know.en.srt |
681 |
6BD98171 |
Learning Ransomware Countermeasures\1.Introduction\01.Welcome.en.srt |
1,487 |
5E5C4319 |
Learning Ransomware Countermeasures\1.Introduction\01.Welcome.mp4
[595b729be2553ffe]
|
8,602,717 |
85D4C72C |
Learning Ransomware Countermeasures\1.Introduction\02.What you need to know.mp4
[46f2fa9ea0d1d205]
|
1,386,107 |
3FDA67E3 |
Learning Ransomware Countermeasures\6.Conclusion\30.Next steps.en.srt |
2,079 |
258E77F5 |
Learning Ransomware Countermeasures\6.Conclusion\30.Next steps.mp4
[e827b8d54a999ec2]
|
3,131,912 |
3777FF68 |
Learning Ransomware Countermeasures\5.4. Good Practice\22.Potentially unwanted program.en.srt |
4,280 |
586DDB6E |
Learning Ransomware Countermeasures\5.4. Good Practice\27.Incident management.mp4
[39f3d78f5ff17f3]
|
5,411,966 |
52ED292F |
Learning Ransomware Countermeasures\5.4. Good Practice\25.Spam and ransomware.mp4
[f7c5112d521eb8ff]
|
7,566,741 |
6CF22321 |
Learning Ransomware Countermeasures\5.4. Good Practice\27.Incident management.en.srt |
3,076 |
1F8C5433 |
Learning Ransomware Countermeasures\5.4. Good Practice\28.Report ransomware.en.srt |
3,628 |
8E49F0AA |
Learning Ransomware Countermeasures\5.4. Good Practice\26.Phishing and spoofing.mp4
[17c07623aad887c7]
|
15,369,264 |
15956B36 |
Learning Ransomware Countermeasures\5.4. Good Practice\25.Spam and ransomware.en.srt |
4,292 |
25886924 |
Learning Ransomware Countermeasures\5.4. Good Practice\29.Best practices.mp4
[bef38c2d59766c55]
|
7,392,420 |
27144B85 |
Learning Ransomware Countermeasures\5.4. Good Practice\24.Patch and update.en.srt |
6,656 |
8E7CE2BA |
Learning Ransomware Countermeasures\5.4. Good Practice\24.Patch and update.mp4
[3b25d033ba379b96]
|
11,107,709 |
A9ECBE8D |
Learning Ransomware Countermeasures\5.4. Good Practice\29.Best practices.en.srt |
3,793 |
2FED81EE |
Learning Ransomware Countermeasures\5.4. Good Practice\23.Secure your router.en.srt |
5,262 |
40D16318 |
Learning Ransomware Countermeasures\5.4. Good Practice\23.Secure your router.mp4
[9eb2c98ea1916590]
|
9,024,926 |
49752D38 |
Learning Ransomware Countermeasures\5.4. Good Practice\28.Report ransomware.mp4
[8844556c385579c3]
|
6,944,595 |
26B98F64 |
Learning Ransomware Countermeasures\5.4. Good Practice\22.Potentially unwanted program.mp4
[fed61b3de7e0541d]
|
7,872,965 |
635463BE |
Learning Ransomware Countermeasures\5.4. Good Practice\26.Phishing and spoofing.en.srt |
9,290 |
38A0635E |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\20.Secure Remote Desktop Protocol.en.srt |
4,799 |
DE153FA4 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\18.Protect the server.en.srt |
5,865 |
AF6B5943 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\16.Browser security.en.srt |
6,900 |
973DCCE6 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\19.Software Restriction Policy.en.srt |
5,946 |
A5C126C3 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\15.File Server Resource Manager.mp4
[7b87e6f03fdf565e]
|
11,016,605 |
1721C7E3 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\15.File Server Resource Manager.en.srt |
6,415 |
33BFDA03 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\17.Update the OS.en.srt |
5,333 |
7693901B |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\18.Protect the server.mp4
[bfd82987cfdf049e]
|
9,173,369 |
B6E5D2EC |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\14.CryptoLocker detection.en.srt |
5,120 |
2EBFC008 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\21.Backup and recovery.mp4
[47bce0ba1fa46e]
|
9,257,060 |
903819FB |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\19.Software Restriction Policy.mp4
[786b02dd82ba46a8]
|
7,792,109 |
DA6CAF37 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\14.CryptoLocker detection.mp4
[4817054368be487b]
|
8,871,895 |
D8B9750F |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\20.Secure Remote Desktop Protocol.mp4
[83bf744584f9c8ae]
|
8,434,153 |
6318A525 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\16.Browser security.mp4
[fbe74f7585474223]
|
11,951,402 |
681EE54B |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\17.Update the OS.mp4
[8f4f13d9a7b89c01]
|
10,707,958 |
B2E446F5 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows\21.Backup and recovery.en.srt |
6,229 |
8115DF8D |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\10.Onion ransomware.mp4
[93d9001a0aec0748]
|
9,799,441 |
478CBBB0 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\10.Onion ransomware.en.srt |
3,511 |
D9CA0969 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\11.Mobile ransomware.en.srt |
4,281 |
2D224283 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\12.Unmapped network shares.en.srt |
4,525 |
30EC0FFA |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\13.Cloud ransomware.en.srt |
4,511 |
75A92BA8 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\09.Elusive threat.en.srt |
4,535 |
7D6BBD23 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\13.Cloud ransomware.mp4
[c4e5b2fd245b5624]
|
7,713,218 |
4365FCD3 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\11.Mobile ransomware.mp4
[e3dcf1418d49a48e]
|
7,527,223 |
1FB3EF1C |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\09.Elusive threat.mp4
[98d63fcb8e0595de]
|
8,146,226 |
945B49F4 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware\12.Unmapped network shares.mp4
[6b6c0c0d4faadf48]
|
7,755,547 |
12D7D456 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\04.Affected operating systems.mp4
[6569f8f39c120b0f]
|
6,972,575 |
FA490534 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\06.Using a macro.en.srt |
4,331 |
2CCCC3AA |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\07.Old threats are new.en.srt |
3,413 |
286B76AB |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\07.Old threats are new.mp4
[23be35ef8315eb51]
|
7,799,986 |
CDE7BDE1 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\06.Using a macro.mp4
[14bd62cfc9ee4591]
|
5,564,187 |
37CE4CF9 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\03.Step through the process.en.srt |
4,765 |
2AFB8449 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\03.Step through the process.mp4
[782678bac54efc34]
|
7,573,331 |
0C891B2C |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\04.Affected operating systems.en.srt |
4,226 |
5D6CE71A |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\05.Social engineering.en.srt |
5,077 |
B8750251 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\08.Ransomware as a service.en.srt |
4,245 |
82CD3F7C |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\05.Social engineering.mp4
[88336f559a070e31]
|
8,059,156 |
92C35A9D |
Learning Ransomware Countermeasures\2.1. Ransomware Overview\08.Ransomware as a service.mp4
[6b3122ebecb1c44c]
|
7,169,389 |
D74812D8 |
Learning Ransomware Countermeasures\1.Introduction |
0 |
00000000 |
Learning Ransomware Countermeasures\6.Conclusion |
0 |
00000000 |
Learning Ransomware Countermeasures\5.4. Good Practice |
0 |
00000000 |
Learning Ransomware Countermeasures\4.3. Safeguarding Windows |
0 |
00000000 |
Learning Ransomware Countermeasures\3.2. Types of Ransomware |
0 |
00000000 |
Learning Ransomware Countermeasures\2.1. Ransomware Overview |
0 |
00000000 |
Learning Ransomware Countermeasures |
0 |
00000000 |
|
Total size: |
245,234,703 |
|