Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size691.1 MB
  • Uploaded Byfreecoursewb
  • Downloads161
  • Last checkedSep. 01st '23
  • Date uploadedAug. 31st '23
  • Seeders 17
  • Leechers17

Infohash : 1CDA1B1B06B2F8E5E81B162ED1B18E990888B5E3

Cyber Security Case Studies: Stuxnet, Wannacry, And Pegasus



https://DevCourseWeb.com

Published 8/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 691.11 MB | Duration: 2h 4m

Understanding End-to-End Cyber Attack Architectures for Enhanced Security Awareness

What you'll learn
Case studies detailing motivation, attacker, end-to-end architecture and consequences of the attack
Stuxnet Worm
WannaCry Ransomware
Pegasus Spyware

Requirements
Basic understanding of computer technologies
Basic understanding of security concepts like encryption
Curiosity about cyber security

Files:

[ DevCourseWeb.com ] Udemy - Cyber Security Case Studies - Stuxnet, Wannacry, And Pegasus
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 1 - Getting Started
    • 1 - Introduction English.vtt (6.8 KB)
    • 1 - Introduction.mp4 (33.9 MB)
    • 2 - How to Get Most Out of Course English.vtt (0.8 KB)
    • 2 - How to Get Most Out of Course.mp4 (1.5 MB)
    2 - Stuxnet
    • 1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html (0.3 KB)
    • 10 - Compromising Step 7 Software on Windows Field PGs English.vtt (2.9 KB)
    • 10 - Compromising Step 7 Software on Windows Field PGs.mp4 (13.5 MB)
    • 11 - Altering Centrifuge Operations English.vtt (1.0 KB)
    • 11 - Altering Centrifuge Operations.mp4 (4.6 MB)
    • 12 - Stuxnet Command and Control English.vtt (0.9 KB)
    • 12 - Stuxnet Command and Control.mp4 (4.8 MB)
    • 13 - Updating Stuxnet through RPC English.vtt (2.7 KB)
    • 13 - Updating Stuxnet through RPC.mp4 (11.3 MB)
    • 14 - Detection of Stuxnet English.vtt (3.0 KB)
    • 14 - Detection of Stuxnet.mp4 (20.9 MB)
    • 15 - Stuxnet Spin Offs English.vtt (3.3 KB)
    • 15 - Stuxnet Spin Offs.mp4 (13.0 MB)
    • 16 - Final Thoughts on Stuxnet English.vtt (1.3 KB)
    • 16 - Final Thoughts on Stuxnet.mp4 (5.6 MB)
    • 3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure English.vtt (3.0 KB)
    • 3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp4 (11.4 MB)
    • 4 - Motivation behind Stuxnet English.vtt (2.1 KB)
    • 4 - Motivation behind Stuxnet.mp4 (18.6 MB)
    • 5 - Normal Operations at the Nuclear Plant English.vtt (2.9 KB)
    • 5 - Normal Operations at the Nuclear Plant.mp4 (8.8 MB)
    • 6 - Stuxnet Attack Overview English.vtt (2.3 KB)
    • 6 - Stuxnet Attack Overview.mp4 (8.0 MB)
    • 7 - Entering the Facility by Compromising Initial Systems English.vtt (4.4 KB)
    • 7 - Entering the Facility by Compromising Initial Systems.mp4 (20.0 MB)
    • 8 - Finding Field PGs with Network Propagation Techniques English.vtt (3.4 KB)
    • 8 - Finding Field PGs with Network Propagation Techniques.mp4 (17.5 MB)
    • 9 - Spreading through Infected USB Drives English.vtt (3.2 KB)
    • 9 - Spreading through Infected USB Drives.mp4 (18.2 MB)
    3 - WannaCry
    • 17 - What is a Ransomware English.vtt (3.7 KB)
    • 17 - What is a Ransomware.mp4 (28.6 MB)
    • 18 - Evolution of Ransomware English.vtt (8.6 KB)
    • 18 - Evolution of Ransomware.mp4 (27.2 MB)
    • 19 - Modern Ransomware Impact English.vtt (2.8 KB)
    • 19 - Modern Ransomware Impact.mp4 (10.4 MB)
    • 2 - The WannaCry Ransomware Quiz.html (0.6 KB)
    • 20 - Introduction to WannaCry Ransomware English.vtt (3.3 KB)
    • 20 - Introduction to WannaCry Ransomware.mp4 (21.2 MB)
    • 21 - WannaCry Components English.vtt (1.9 KB)
    • 21 - WannaCry Components.mp4 (10.3 MB)
    • 22 - The Kill Switch English.vtt (2.4 KB)
    • 22 - The Kill Switch.mp4 (8.4 MB)
    • 23 - Starting the Windows Service English.vtt (1.9 KB)
    • 23 - Starting the Windows Service.mp4 (6.9 MB)
    • 24 - Unload Resources used in the Attack English.vtt (3.7 KB)
    • 24 - Unload Resources used in the Attack.mp4 (19.1 MB)
    • 25 - Decrypting the Encrypted DLL Component English.vtt (2.4 KB)
    • 25 - Decrypting the Encrypted DLL Component.mp4 (10.8 MB)
    • 26 - Key Generation and Encryption of User Files English.vtt (3.9 KB)
    • 26 - Key Generation and Encryption of User Files.mp4 (20.8 MB)
    • 27 - What does WannaCry Encrypt English.vtt (1.7 KB)
    • 27 - What does WannaCry Encrypt.mp4 (12.9 MB)
    • 28 - Additional Processes in the Attack English.vtt (2.1 KB)
    • 28 - Additional Processes in the Attack.mp4 (13.2 MB)
    • 29 - Increasing Impact and Preventing Recovery English.vtt (1.3 KB)
    • 29 - Increasing Impact and Preventing Recovery.mp4 (10.5 MB)
    • 30 - Unveiling Command and Control Communication English.vtt (2.8 KB)
    • 30 - Unveiling Command and Control Communication.mp4 (21.5 MB)
    • 31 - How much money did attackers collect English.vtt (2.4 KB)
    • 31 - How much money did attackers collect.mp4 (22.3 MB)
    • 32 - Why is the data not Recoverable English.vtt (2.3 KB)
    • 32 - Why is the data not Recoverable.mp4 (11.7 MB)
    • 33 - The Worm Component Propagation of WannaCry English.vtt (2.6 KB)
    • 33 - The Worm Component Propagation of WannaCry.mp4 (13.5 MB)
    • 34 - Preventing WannaCry Safeguarding Your Systems English.vtt (3.0 KB)
    • 34 - Preventing WannaCry Safeguarding Your Systems.mp4 (14.8 MB)
    • 35 - Final Thoughts on WannaCry English.vtt (0.7 KB)
    • 35 - Final Thoughts on WannaCry.mp4 (5.7 MB)
    4 - Pegasus
    • 3 - Pegasus Quiz.html (0.3 KB)
    • 36 - What is Spyware English.vtt (6.8 KB)
    • 36 - What is Spyware.mp4 (45.7 MB)
    • 37 - Introduction to Pegasus Spyware English.vtt (4.9 KB)
    • 37 - Introduction to Pegasus Spyware.mp4 (29.5 MB)
    • 38 - Pegasus Device Infection English.vtt (3.5 KB)
    • 38 - Pegasus Device Infection.mp4 (9.0 MB)
    • 39 - Device Exploit Trident Vulnerability English.vtt (5.5 KB)
    • 39 - Device Exploit Trident Vulnerability.mp4 (20.4 MB)
    • 40 - Agent Installation and Persistence English.vtt (2.4 KB)
    • 40 - Agent Installation and Persistence.mp4 (12.2 MB)
    • 41 - User Device and Surveillance English.vtt (3.8 KB)
    • 41 - User Device and Surveillance.mp4 (19.6 MB)
    • 42 - Data Exfiltration to Command and Control English.vtt (2.2 KB)
    • 42 - Data Exfiltration to Command and Control.mp4 (13.0 MB)
    • 43 - Pegasus Abuse English.vtt (1.9 KB)
    • 43 - Pegasus Abuse.mp4 (20.9 MB)
    • 44 - Final Thoughts on Pegasus English.vtt (1.7 KB)
    • 44 - Final Thoughts on Pegasus.mp4 (9.5 MB)
    5 - Wrap Up
    • 45 - Course Summary English.vtt (2.1 KB)
    • 45 - Course Summary.mp4 (9.7 MB)
    • Bonus Resources.txt (0.4 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce