|
Обратите внимание, что наш сайт не размещает какие-либо файлы из списка. Вы не можете скачать
эти файлы или скачать torrent-файл.
|
| 10 - Compromising Step 7 Software on Windows Field PGs.mp4 |
13.49Мб |
| 10 - Compromising Step 7 Software on Windows Field PGs English.vtt |
2.86Кб |
| 11 - Altering Centrifuge Operations.mp4 |
4.61Мб |
| 11 - Altering Centrifuge Operations English.vtt |
994б |
| 12 - Stuxnet Command and Control.mp4 |
4.81Мб |
| 12 - Stuxnet Command and Control English.vtt |
948б |
| 13 - Updating Stuxnet through RPC.mp4 |
11.28Мб |
| 13 - Updating Stuxnet through RPC English.vtt |
2.65Кб |
| 14 - Detection of Stuxnet.mp4 |
20.86Мб |
| 14 - Detection of Stuxnet English.vtt |
3.01Кб |
| 15 - Stuxnet Spin Offs.mp4 |
13.05Мб |
| 15 - Stuxnet Spin Offs English.vtt |
3.33Кб |
| 16 - Final Thoughts on Stuxnet.mp4 |
5.58Мб |
| 16 - Final Thoughts on Stuxnet English.vtt |
1.25Кб |
| 17 - What is a Ransomware.mp4 |
28.59Мб |
| 17 - What is a Ransomware English.vtt |
3.73Кб |
| 18 - Evolution of Ransomware.mp4 |
27.20Мб |
| 18 - Evolution of Ransomware English.vtt |
8.58Кб |
| 19 - Modern Ransomware Impact.mp4 |
10.36Мб |
| 19 - Modern Ransomware Impact English.vtt |
2.75Кб |
| 1 - Introduction.mp4 |
33.89Мб |
| 1 - Introduction English.vtt |
6.85Кб |
| 1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html |
309б |
| 20 - Introduction to WannaCry Ransomware.mp4 |
21.16Мб |
| 20 - Introduction to WannaCry Ransomware English.vtt |
3.26Кб |
| 21 - WannaCry Components.mp4 |
10.27Мб |
| 21 - WannaCry Components English.vtt |
1.94Кб |
| 22 - The Kill Switch.mp4 |
8.37Мб |
| 22 - The Kill Switch English.vtt |
2.41Кб |
| 23 - Starting the Windows Service.mp4 |
6.94Мб |
| 23 - Starting the Windows Service English.vtt |
1.87Кб |
| 24 - Unload Resources used in the Attack.mp4 |
19.11Мб |
| 24 - Unload Resources used in the Attack English.vtt |
3.67Кб |
| 25 - Decrypting the Encrypted DLL Component.mp4 |
10.75Мб |
| 25 - Decrypting the Encrypted DLL Component English.vtt |
2.43Кб |
| 26 - Key Generation and Encryption of User Files.mp4 |
20.84Мб |
| 26 - Key Generation and Encryption of User Files English.vtt |
3.93Кб |
| 27 - What does WannaCry Encrypt.mp4 |
12.94Мб |
| 27 - What does WannaCry Encrypt English.vtt |
1.68Кб |
| 28 - Additional Processes in the Attack.mp4 |
13.20Мб |
| 28 - Additional Processes in the Attack English.vtt |
2.09Кб |
| 29 - Increasing Impact and Preventing Recovery.mp4 |
10.54Мб |
| 29 - Increasing Impact and Preventing Recovery English.vtt |
1.31Кб |
| 2 - How to Get Most Out of Course.mp4 |
1.52Мб |
| 2 - How to Get Most Out of Course English.vtt |
806б |
| 2 - The WannaCry Ransomware Quiz.html |
587б |
| 30 - Unveiling Command and Control Communication.mp4 |
21.50Мб |
| 30 - Unveiling Command and Control Communication English.vtt |
2.84Кб |
| 31 - How much money did attackers collect.mp4 |
22.29Мб |
| 31 - How much money did attackers collect English.vtt |
2.38Кб |
| 32 - Why is the data not Recoverable.mp4 |
11.71Мб |
| 32 - Why is the data not Recoverable English.vtt |
2.34Кб |
| 33 - The Worm Component Propagation of WannaCry.mp4 |
13.54Мб |
| 33 - The Worm Component Propagation of WannaCry English.vtt |
2.60Кб |
| 34 - Preventing WannaCry Safeguarding Your Systems.mp4 |
14.75Мб |
| 34 - Preventing WannaCry Safeguarding Your Systems English.vtt |
3.02Кб |
| 35 - Final Thoughts on WannaCry.mp4 |
5.73Мб |
| 35 - Final Thoughts on WannaCry English.vtt |
692б |
| 36 - What is Spyware.mp4 |
45.68Мб |
| 36 - What is Spyware English.vtt |
6.81Кб |
| 37 - Introduction to Pegasus Spyware.mp4 |
29.55Мб |
| 37 - Introduction to Pegasus Spyware English.vtt |
4.91Кб |
| 38 - Pegasus Device Infection.mp4 |
8.99Мб |
| 38 - Pegasus Device Infection English.vtt |
3.46Кб |
| 39 - Device Exploit Trident Vulnerability.mp4 |
20.43Мб |
| 39 - Device Exploit Trident Vulnerability English.vtt |
5.51Кб |
| 3 - Pegasus Quiz.html |
300б |
| 3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp4 |
11.44Мб |
| 3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure English.vtt |
2.98Кб |
| 40 - Agent Installation and Persistence.mp4 |
12.23Мб |
| 40 - Agent Installation and Persistence English.vtt |
2.40Кб |
| 41 - User Device and Surveillance.mp4 |
19.65Мб |
| 41 - User Device and Surveillance English.vtt |
3.76Кб |
| 42 - Data Exfiltration to Command and Control.mp4 |
13.00Мб |
| 42 - Data Exfiltration to Command and Control English.vtt |
2.20Кб |
| 43 - Pegasus Abuse.mp4 |
20.87Мб |
| 43 - Pegasus Abuse English.vtt |
1.88Кб |
| 44 - Final Thoughts on Pegasus.mp4 |
9.49Мб |
| 44 - Final Thoughts on Pegasus English.vtt |
1.67Кб |
| 45 - Course Summary.mp4 |
9.67Мб |
| 45 - Course Summary English.vtt |
2.13Кб |
| 4 - Motivation behind Stuxnet.mp4 |
18.56Мб |
| 4 - Motivation behind Stuxnet English.vtt |
2.14Кб |
| 5 - Normal Operations at the Nuclear Plant.mp4 |
8.78Мб |
| 5 - Normal Operations at the Nuclear Plant English.vtt |
2.92Кб |
| 6 - Stuxnet Attack Overview.mp4 |
8.03Мб |
| 6 - Stuxnet Attack Overview English.vtt |
2.27Кб |
| 7 - Entering the Facility by Compromising Initial Systems.mp4 |
20.00Мб |
| 7 - Entering the Facility by Compromising Initial Systems English.vtt |
4.39Кб |
| 8 - Finding Field PGs with Network Propagation Techniques.mp4 |
17.45Мб |
| 8 - Finding Field PGs with Network Propagation Techniques English.vtt |
3.36Кб |
| 9 - Spreading through Infected USB Drives.mp4 |
18.24Мб |
| 9 - Spreading through Infected USB Drives English.vtt |
3.19Кб |
| Bonus Resources.txt |
386б |
| Get Bonus Downloads Here.url |
182б |