Preventing Ransomware
This course has been retired. Check out the alternatives below
-
What do you get with a Packt Subscription?
- Instant access to this title and 7,500+ eBooks & Videos
- Constantly updated with 100+ new titles each month
- Breadth and depth in over 1,000+ technologies
-
Malware from Fun to Profit
- Malware from Fun to Profit
- 1. The malware story
- 2. Windows operating system basics
- 3. Malware components
- 4. Types of malware
- 5. How does antivirus name malware?
- 6. Summary
-
Malware Analysis Fundamentals
- Malware Analysis Fundamentals
- 1. Static analysis
- 2. Dynamic or behavior analysis
- 3. Summary
-
Ransomware Distribution
- Ransomware Distribution
- 1. Attacks through emails
- 2. Microsoft Word macros
- 3. Web attacks
- 4. Lateral movement
- 5. Botnets and downloaders
- 6. Summary
-
Ransomware Techniques for Hijacking the System
- Ransomware Techniques for Hijacking the System
- 1. Scareware and rogue security software
- 2. ScreenLocker ransomware
- 3. Browser locker
- 4. Crypto ransomware
- 5. Ransomware targeting infrastructure
- 6. Boot ransomware
- 7. Summary
-
Ransomware Economics
- Ransomware Economics
- 1. Anonymity
- 2. Ransomware payment modes
- 3. RaaS
- 4. Other forms of ransom
- 5. Summary
-
Case Study of Famous Ransomware
- Case Study of Famous Ransomware
- 1. Reveton
- 2. VirLock – the hybrid ransomware
- 3. GPCODE or PGPCoder
- 4. CryptoLocker
- 5. Cryptowall
- 6. Locky
- 7. Cerber
- 8. Petya
- 9. WannaCry
- 10. NotPetya
- 11. BadRabbit
- 12. Ransomware on Android, macOS, and Linux
- 13. Summary
-
Other Forms of Digital Extortion
- Other Forms of Digital Extortion
- 1. DoS attacks
- 2. Data breach attacks
- 3. Summary
-
Ransomware Detection and Prevention
- Ransomware Detection and Prevention
- 1. Desktop configuration
- 2. Antivirus
- 3. Exploit prevention on Windows
- 4. Anti-bootkit
- 5. Detection on a network
- 6. Honeypots
- 7. Analytics, machine learning, and correlation
- 8. Data protection
- 9. Process and compliance
- 10. Summary
-
Incident Response
- Incident Response
- 1. Isolating the infected machine
- 2. Notifying the law authorities
- 3. Contacting the antivirus vendor
- 4. Help from the web
- 5. Forensics
- 6. Summary
-
The Future of Ransomware
- The Future of Ransomware
- 1. The future of malware capabilities
- 2. Future victims
- 3. Summary