FileMood

Download [ DevCourseWeb.com ] Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus

DevCourseWeb com Udemy Cyber Security Case Studies Stuxnet Wannacry And Pegasus

Name

[ DevCourseWeb.com ] Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus

 DOWNLOAD Copy Link

Total Size

724.6 MB

Total Files

95

Last Seen

2024-12-22 00:59

Hash

1CDA1B1B06B2F8E5E81B162ED1B18E990888B5E3

/

Get Bonus Downloads Here.url

0.2 KB

/1 - Getting Started/

1 - Introduction English.vtt

7.0 KB

1 - Introduction.mp4

35.5 MB

2 - How to Get Most Out of Course English.vtt

0.8 KB

2 - How to Get Most Out of Course.mp4

1.6 MB

/2 - Stuxnet/

1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html

0.3 KB

10 - Compromising Step 7 Software on Windows Field PGs English.vtt

2.9 KB

10 - Compromising Step 7 Software on Windows Field PGs.mp4

14.1 MB

11 - Altering Centrifuge Operations English.vtt

1.0 KB

11 - Altering Centrifuge Operations.mp4

4.8 MB

12 - Stuxnet Command and Control English.vtt

0.9 KB

12 - Stuxnet Command and Control.mp4

5.0 MB

13 - Updating Stuxnet through RPC English.vtt

2.7 KB

13 - Updating Stuxnet through RPC.mp4

11.8 MB

14 - Detection of Stuxnet English.vtt

3.1 KB

14 - Detection of Stuxnet.mp4

21.9 MB

15 - Stuxnet Spin Offs English.vtt

3.4 KB

15 - Stuxnet Spin Offs.mp4

13.7 MB

16 - Final Thoughts on Stuxnet English.vtt

1.3 KB

16 - Final Thoughts on Stuxnet.mp4

5.8 MB

3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure English.vtt

3.1 KB

3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp4

12.0 MB

4 - Motivation behind Stuxnet English.vtt

2.2 KB

4 - Motivation behind Stuxnet.mp4

19.5 MB

5 - Normal Operations at the Nuclear Plant English.vtt

3.0 KB

5 - Normal Operations at the Nuclear Plant.mp4

9.2 MB

6 - Stuxnet Attack Overview English.vtt

2.3 KB

6 - Stuxnet Attack Overview.mp4

8.4 MB

7 - Entering the Facility by Compromising Initial Systems English.vtt

4.5 KB

7 - Entering the Facility by Compromising Initial Systems.mp4

21.0 MB

8 - Finding Field PGs with Network Propagation Techniques English.vtt

3.4 KB

8 - Finding Field PGs with Network Propagation Techniques.mp4

18.3 MB

9 - Spreading through Infected USB Drives English.vtt

3.3 KB

9 - Spreading through Infected USB Drives.mp4

19.1 MB

/3 - WannaCry/

17 - What is a Ransomware English.vtt

3.8 KB

17 - What is a Ransomware.mp4

30.0 MB

18 - Evolution of Ransomware English.vtt

8.8 KB

18 - Evolution of Ransomware.mp4

28.5 MB

19 - Modern Ransomware Impact English.vtt

2.8 KB

19 - Modern Ransomware Impact.mp4

10.9 MB

2 - The WannaCry Ransomware Quiz.html

0.6 KB

20 - Introduction to WannaCry Ransomware English.vtt

3.3 KB

20 - Introduction to WannaCry Ransomware.mp4

22.2 MB

21 - WannaCry Components English.vtt

2.0 KB

21 - WannaCry Components.mp4

10.8 MB

22 - The Kill Switch English.vtt

2.5 KB

22 - The Kill Switch.mp4

8.8 MB

23 - Starting the Windows Service English.vtt

1.9 KB

23 - Starting the Windows Service.mp4

7.3 MB

24 - Unload Resources used in the Attack English.vtt

3.8 KB

24 - Unload Resources used in the Attack.mp4

20.0 MB

25 - Decrypting the Encrypted DLL Component English.vtt

2.5 KB

25 - Decrypting the Encrypted DLL Component.mp4

11.3 MB

26 - Key Generation and Encryption of User Files English.vtt

4.0 KB

26 - Key Generation and Encryption of User Files.mp4

21.9 MB

27 - What does WannaCry Encrypt English.vtt

1.7 KB

27 - What does WannaCry Encrypt.mp4

13.6 MB

28 - Additional Processes in the Attack English.vtt

2.1 KB

28 - Additional Processes in the Attack.mp4

13.8 MB

29 - Increasing Impact and Preventing Recovery English.vtt

1.3 KB

29 - Increasing Impact and Preventing Recovery.mp4

11.0 MB

30 - Unveiling Command and Control Communication English.vtt

2.9 KB

30 - Unveiling Command and Control Communication.mp4

22.5 MB

31 - How much money did attackers collect English.vtt

2.4 KB

31 - How much money did attackers collect.mp4

23.4 MB

32 - Why is the data not Recoverable English.vtt

2.4 KB

32 - Why is the data not Recoverable.mp4

12.3 MB

33 - The Worm Component Propagation of WannaCry English.vtt

2.7 KB

33 - The Worm Component Propagation of WannaCry.mp4

14.2 MB

34 - Preventing WannaCry Safeguarding Your Systems English.vtt

3.1 KB

34 - Preventing WannaCry Safeguarding Your Systems.mp4

15.5 MB

35 - Final Thoughts on WannaCry English.vtt

0.7 KB

35 - Final Thoughts on WannaCry.mp4

6.0 MB

/4 - Pegasus/

3 - Pegasus Quiz.html

0.3 KB

36 - What is Spyware English.vtt

7.0 KB

36 - What is Spyware.mp4

47.9 MB

37 - Introduction to Pegasus Spyware English.vtt

5.0 KB

37 - Introduction to Pegasus Spyware.mp4

31.0 MB

38 - Pegasus Device Infection English.vtt

3.5 KB

38 - Pegasus Device Infection.mp4

9.4 MB

39 - Device Exploit Trident Vulnerability English.vtt

5.6 KB

39 - Device Exploit Trident Vulnerability.mp4

21.4 MB

40 - Agent Installation and Persistence English.vtt

2.5 KB

40 - Agent Installation and Persistence.mp4

12.8 MB

41 - User Device and Surveillance English.vtt

3.9 KB

41 - User Device and Surveillance.mp4

20.6 MB

42 - Data Exfiltration to Command and Control English.vtt

2.3 KB

42 - Data Exfiltration to Command and Control.mp4

13.6 MB

43 - Pegasus Abuse English.vtt

1.9 KB

43 - Pegasus Abuse.mp4

21.9 MB

44 - Final Thoughts on Pegasus English.vtt

1.7 KB

44 - Final Thoughts on Pegasus.mp4

9.9 MB

/5 - Wrap Up/

45 - Course Summary English.vtt

2.2 KB

45 - Course Summary.mp4

10.1 MB

/~Get Your Files Here !/

Bonus Resources.txt

0.4 KB

 

Total files 95


Copyright © 2024 FileMood.com