The Evolution and Impact of Ransomware
Pages Count
26 Pages
Links for the courses
Origins Evolution of Ransomware | |
Understanding P1 RaaS  Model | |
RaaS P2: IABs and Builders | |
RaaS P3: Exploring Builders | |
RaaS P4: Dashboards, Darknet Marketplaces | |
P5 Evolving World of Ransomware | |
P6 Ransom Extortion, DLSs, Resource | Â Click Me |
P7 Ransomware Operators Communicate and Share Data | |
P8Â Hosting and Affiliate Programs | |
P9Â Ransomware Analysis: A Guide | |
P10 Variables for Ransm Analysis | |
P11Â Tools for Ransomware Analysis | |
P12Â Enhancing Win audit -Log-MD | |
P13Â Logging Capabilities with Sysmon | Â Click Me |
P14Â IVs in Ransomware Attacks | Â Click Me |
P15Â Tactics: Leveraging Legitimate Tool | |
P16Â Dark Side of Scripting | Â Click Me |
P17Â Persistence: Art of Staying Hidden | |
P18Â Active Directory Attack(Ransom) | |
P19Â Securing Privileged Accounts | Â Click Me |
P20 Lateral Movement in Attacks | |
P21 Access and Data for Exfiltration | |
P22Â Impact/Recovery Challenges | Â Click Me |
P23 What to Do After Ransom Attack | |
Extra For threat Hunting | |
Threat Detection/Hunting with Specific Queries | |
Techniques and Effective Threat Hunting |
Your Instructor
Dean