Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next

Title Ransomware / Chloé Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono. [O'Reilly electronic resource]

Edition [First edition].
Publication Info. [Place of publication not identified] : O'Reilly Media, Inc., [2022]
QR Code
Description 1 online resource (1 video file (3 hr., 22 min.)) : sound, color.
Playing Time 032200
Description digital rdatr
video file rdaft
Instructional films lcgft
Series Security superstream
Security superstream.
Performer Chloé, Alissa Knight, Cynthia Brumfield, Edna Conway, Keliyn Wagner Ramsdell, Laurie Iacono, presenters.
Summary In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video).
Subject Computer security.
Computer crimes -- Prevention.
Malware (Computer software)
Computer Security
Sécurité informatique.
Logiciels malveillants.
Computer crimes -- Prevention
Computer security
Malware (Computer software)
Genre Webcast
Instructional films
Internet videos
Nonfiction films
Instructional films.
Nonfiction films.
Internet videos.
Films de formation.
Films autres que de fiction.
Vidéos sur Internet.
Added Author Messdaghi, Chloé, presenter.
Knight, Alissa, presenter.
Brumfield, Cynthia, presenter.
Conway, Edna, presenter.
Ramsdell, Kellyn Wagner, presenter.
Iacono, Laurie, presenter.
O'Reilly (Firm), pubisher.
Standard No. 0636920702641
Patron reviews: add a review
Click for more information
EVIDEO
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information