top of page

The Evolution and Impact of Ransomware

Pages Count

26 Pages

Links for the courses


Origins Evolution of Ransomware

Understanding  P1  RaaS  Model

RaaS P2: IABs and Builders 

RaaS P3: Exploring Builders

RaaS P4: Dashboards, Darknet

Marketplaces

P5 Evolving World of Ransomware

P6 Ransom Extortion, DLSs, Resource

P7 Ransomware Operators

Communicate and Share Data

P8 Hosting and Affiliate Programs

P9 Ransomware Analysis: A Guide

P10 Variables for Ransm Analysis

P11 Tools for Ransomware Analysis

P12 Enhancing Win audit -Log-MD

P13 Logging Capabilities with Sysmon

P14 IVs in Ransomware Attacks

P15 Tactics: Leveraging Legitimate Tool

P16 Dark Side of Scripting

P17 Persistence: Art of Staying Hidden

P18 Active Directory Attack(Ransom)

P19 Securing Privileged Accounts

P20 Lateral Movement in  Attacks

P21 Access and  Data for Exfiltration

P22 Impact/Recovery Challenges

P23 What to Do After Ransom Attack

Extra For threat Hunting


Threat Detection/Hunting with Specific Queries

Techniques and Effective Threat Hunting


Your Instructor

Dean

Dean
bottom of page