My Account Log in

1 option

Ransomware / Chlǒ Messdaghi, Alissa Knight, Cynthia Brumfield, Edna Conway, Kellyn Wagner Ramsdell, Laurie Iacono.

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Video
Contributor:
Messdaghi, Chlǒ, presenter.
Knight, Alissa, presenter.
Brumfield, Cynthia, presenter.
Conway, Edna, presenter.
Ramsdell, Kellyn Wagner, presenter.
Iacono, Laurie, presenter.
O'Reilly (Firm), pubisher.
Series:
Security superstream.
Security superstream
Language:
English
Subjects (All):
Computer security.
Computer crimes--Prevention.
Computer crimes.
Malware (Computer software).
Physical Description:
1 online resource (1 video file (3 hr., 22 min.)) : sound, color.
Edition:
[First edition].
Place of Publication:
[Place of publication not identified] : O'Reilly Media, Inc., [2022]
Summary:
In a ransomware attack, hackers use malware to encrypt network files, locking users out of the system until a ransom is paid to a cybercriminal. Within hours, a thriving business can be completely cut off from its sensitive data. So how do you protect yourself and your organization? Join security pros for four hours of sessions on how to better assess threats and develop a security-aware mindset and how to detect and prevent risks and find inflection points. You'll also explore pragmatic approaches for recovering files without paying a ransom, defending against and responding to attacks, handling pitfalls if you do pay, and more. What you'll learn and how you can apply it Explore the fundamentals of security, including how to improve security within your organization Learn the key characteristics of ransomware attacks and how to assess potential security risks Understand the protection strategies and remediation plans for ransomware attacks that should be in place ahead of time This recording of a live event is for you because... You're a security practitioner interested in combating ransomware. You're a developer new to or looking to enter a security role. You're the incident response plan owner for your organization. You want to become well-versed in the foundations and best practices of security. You want to learn about ransomware. You want to get started with bug hunting. Recommended follow-up: Read: Ransomware Protection Playbook (book) Watch: Ransomware (video).
Notes:
OCLC-licensed vendor bibliographic record.
OCLC:
1312649885
Publisher Number:
0636920702641

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account