A Practical Guide to Cyber Crime

A Practical Guide to Cyber Crime

GOTO Conferences via YouTube Direct link

DDoS extortion advice

12 of 22

12 of 22

DDoS extortion advice

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

A Practical Guide to Cyber Crime

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Datadriven research
  3. 3 Sharing data
  4. 4 Competition
  5. 5 Ransomware
  6. 6 How to avoid ransomware
  7. 7 Practical thinking about ransomware
  8. 8 Business email compromise
  9. 9 How to avoid business email compromise
  10. 10 Practical thinking about business email compromise
  11. 11 DDoS extortion email
  12. 12 DDoS extortion advice
  13. 13 Traditional approach to passwords
  14. 14 Oneway hashes
  15. 15 Parallel hashes
  16. 16 Rainbow tables
  17. 17 Salting
  18. 18 What the criminals do
  19. 19 Password changes
  20. 20 Password truths
  21. 21 Summary
  22. 22 Attachments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.