Book Content
chapters • 7h36m total length
1. The History of Human-Operated Ransomware Attacks
2. The Life Cycle of a Human-Operated Ransomware Attack
3. The Incident Response Process
4. Cyber Threat Intelligence and Ransomware
5. Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures
6. Collecting Ransomware-Related Cyber Threat Intelligence
7. Digital Forensic Artifacts and Their Main Sources
8. Investigating Initial Access Techniques
9. Investigating Post-Exploitation Techniques
10. Investigating Data Exfiltration Techniques
11. Investigating Ransomware Deployment Techniques
12. The Unified Ransomware Kill Chain














