Incident Response Techniques for Ransomware Attacks
The evolving ransomware threat landscape brings new challenges to the security personnel of many organizations. The effects of human-operated attacks make practical security approaches the need of the hour as proper response and investigation are crucial. This book discusses how to use these approaches, focusing on real-world scenarios and tools.
Offered by
Difficulty Level
Intermediate
Completion Time
7h36m
Language
English
About Book
Who Is This Book For?
This book is for security researchers, security analysts, or anyone in the incident response landscape who is responsible for building an incident response model for ransomware attacks. A basic understanding of cyber threats will be helpful to get the most out of this book.
Incident Response Techniques for Ransomware Attacks
- About Book
- Who Is This Book For?
- Book Content
Book content
chapters • 7h36m total length
The History of Human-Operated Ransomware Attacks
The Life Cycle of a Human-Operated Ransomware Attack
The Incident Response Process
Cyber Threat Intelligence and Ransomware
Understanding Ransomware Affiliates' Tactics, Techniques, and Procedures
Collecting Ransomware-Related Cyber Threat Intelligence
Digital Forensic Artifacts and Their Main Sources
Investigating Initial Access Techniques
Investigating Post-Exploitation Techniques
Investigating Data Exfiltration Techniques
Investigating Ransomware Deployment Techniques
The Unified Ransomware Kill Chain
Related Resources
Access Ready-to-Use Books for Free!
Get instant access to a library of pre-built books—free trial, no credit card required. Start training your team in minutes!