09 Making a business case for Financial Malware/072 Selecting the right cybercrime solution.mp4 | 111.92 MB |
10 Some simple hacking attempts - demo/084 Gathering Info Exfiltrate.mp4 | 100.06 MB |
08 Financial Malware history with examples/053 Past 3 decades of malware (part 2).mp4 | 93.47 MB |
08 Financial Malware history with examples/055 Zeus.mp4 | 91.72 MB |
08 Financial Malware history with examples/056 Zeus GameOver.mp4 | 88.78 MB |
10 Some simple hacking attempts - demo/083 Locky Ransomware.mp4 | 87.01 MB |
08 Financial Malware history with examples/057 SpyEye.mp4 | 84.13 MB |
08 Financial Malware history with examples/063 Dyre.mp4 | 79.81 MB |
07 Banking challenges related to cyber risk/049 Targeted attacks against financial institutions.mp4 | 79.52 MB |
09 Making a business case for Financial Malware/069 Fraud Prevention Technology.mp4 | 79.39 MB |
09 Making a business case for Financial Malware/077 What about mobile banking.mp4 | 73.29 MB |
10 Some simple hacking attempts - demo/079 XSRF attack.mp4 | 73 MB |
10 Some simple hacking attempts - demo/080 Compromising Public server.mp4 | 72.37 MB |
08 Financial Malware history with examples/064 Dridex.mp4 | 72.36 MB |
08 Financial Malware history with examples/061 Shylock.mp4 | 66.87 MB |
09 Making a business case for Financial Malware/067 Why Fraud Risk Engines fail.mp4 | 66.07 MB |
08 Financial Malware history with examples/059 Citadel.mp4 | 64.37 MB |
09 Making a business case for Financial Malware/068 How to bypass 2 factor authentication (2FA).mp4 | 63.03 MB |
07 Banking challenges related to cyber risk/045 Today Challenges.mp4 | 61.3 MB |
07 Banking challenges related to cyber risk/051 Takedowns and Conclusions.mp4 | 58.96 MB |
07 Banking challenges related to cyber risk/050 Mobile platform and email scams.mp4 | 58.08 MB |
11 Conclusion/086 BONUS - Remember my first promise to you - get certified in less than 30 days.mp4 | 57.25 MB |
01 Introduction/004 My first promise to you - get certified in less than 30 days CIPT CIPM CIPPE.mp4 | 57.2 MB |
09 Making a business case for Financial Malware/071 Customer impact.mp4 | 55.63 MB |
01 Introduction/003 A 1st touch of what you will really get in the course.mp4 | 55.37 MB |
07 Banking challenges related to cyber risk/048 Infection vectors.mp4 | 52.04 MB |
08 Financial Malware history with examples/052 Past 3 decades of malware (part 1).mp4 | 51.7 MB |
07 Banking challenges related to cyber risk/047 Attack Methods.mp4 | 50.87 MB |
10 Some simple hacking attempts - demo/082 Other Web Application Attack Example.mp4 | 50.75 MB |
09 Making a business case for Financial Malware/075 Malware detection - how technology can help.mp4 | 50.47 MB |
09 Making a business case for Financial Malware/074 Malware detection - advanced.mp4 | 49.53 MB |
08 Financial Malware history with examples/058 IceIX.mp4 | 48.76 MB |
08 Financial Malware history with examples/054 The architecture of financial malware.mp4 | 47.92 MB |
06 Incident Response Tools for GDPR compliance - free vs enterprise/043 A list of open source tools to use.mp4 | 47.33 MB |
08 Financial Malware history with examples/060 Carberp.mp4 | 45.66 MB |
07 Banking challenges related to cyber risk/046 Target and Distribution.mp4 | 44.82 MB |
09 Making a business case for Financial Malware/076 Criminal Detection Account Takeover.mp4 | 44.26 MB |
08 Financial Malware history with examples/065 Shifu.mp4 | 40.48 MB |
03 Building a Security Operations Center (SOC)/020 Cheat Sheets to help you in configuring your systems.mp4 | 35.08 MB |
06 Incident Response Tools for GDPR compliance - free vs enterprise/044 Windows Defender ATP.mp4 | 34.37 MB |
08 Financial Malware history with examples/066 Tinba.mp4 | 33.75 MB |
04 GDPR and Incident Response/024 GDPR Incident Response Process.mp4 | 31.93 MB |
10 Some simple hacking attempts - demo/078 Lab setup.mp4 | 31.71 MB |
10 Some simple hacking attempts - demo/081 Break-In Compromising the victim computer.mp4 | 28.09 MB |
09 Making a business case for Financial Malware/070 Compliance and Legal Issues.mp4 | 26.02 MB |
09 Making a business case for Financial Malware/073 Malware detection.mp4 | 24.49 MB |
08 Financial Malware history with examples/062 Bugat.mp4 | 20.25 MB |
05 GDPR Incident Response Methodologies (IRM)/028 IRM2 - Windows Intrusion.mp4 | 16.86 MB |
05 GDPR Incident Response Methodologies (IRM)/029 IRM3 - UnixLinux Intrusion Detection.mp4 | 15.14 MB |
05 GDPR Incident Response Methodologies (IRM)/027 IRM1 - Worm Infection.mp4 | 14.39 MB |