Cargando…

Ransomware /

In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pr...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: O'Reilly (Firm) (pubisher.)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, Inc., [2022]
Edición:[First edition].
Colección:Security superstream.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Descripción
Sumario:In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video).
Descripción Física:1 online resource (1 video file (3 hr., 22 min.)) : sound, color.
Tiempo de Juego:03:22:00