Completed
DDoS extortion advice
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
A Practical Guide to Cyber Crime
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Datadriven research
- 3 Sharing data
- 4 Competition
- 5 Ransomware
- 6 How to avoid ransomware
- 7 Practical thinking about ransomware
- 8 Business email compromise
- 9 How to avoid business email compromise
- 10 Practical thinking about business email compromise
- 11 DDoS extortion email
- 12 DDoS extortion advice
- 13 Traditional approach to passwords
- 14 Oneway hashes
- 15 Parallel hashes
- 16 Rainbow tables
- 17 Salting
- 18 What the criminals do
- 19 Password changes
- 20 Password truths
- 21 Summary
- 22 Attachments