Companies Home Search Profile

Cybersecurity Case Studies: Stuxnet, WannaCry, and Pegasus

Focused View

Cloud Shikshak

2:04:10

42 View
  • 1 - Introduction.mp4
    06:00
  • 2 - How to Get Most Out of Course.mp4
    00:44
  • 1 - Test Your Knowledge on Stuxnet the Infamous Cyberweapon.html
  • 3 - Stuxnet Worlds First Malware Targeting Physical Infrastructure.mp4
    02:40
  • 4 - Motivation behind Stuxnet.mp4
    01:53
  • 5 - Normal Operations at the Nuclear Plant.mp4
    02:43
  • 6 - Stuxnet Attack Overview.mp4
    01:59
  • 7 - Entering the Facility by Compromising Initial Systems.mp4
    04:02
  • 8 - Finding Field PGs with Network Propagation Techniques.mp4
    03:05
  • 9 - Spreading through Infected USB Drives.mp4
    02:56
  • 10 - Compromising Step 7 Software on Windows Field PGs.mp4
    02:48
  • 11 - Altering Centrifuge Operations.mp4
    00:53
  • 12 - Stuxnet Command and Control.mp4
    00:50
  • 13 - Updating Stuxnet through RPC.mp4
    02:15
  • 14 - Detection of Stuxnet.mp4
    02:39
  • 15 - Stuxnet Spin Offs.mp4
    03:01
  • 16 - Final Thoughts on Stuxnet.mp4
    01:07
  • 2 - The WannaCry Ransomware Quiz.html
  • 17 - What is a Ransomware.mp4
    03:18
  • 18 - Evolution of Ransomware.mp4
    07:48
  • 19 - Modern Ransomware Impact.mp4
    02:27
  • 20 - Introduction to WannaCry Ransomware.mp4
    03:00
  • 21 - WannaCry Components.mp4
    01:53
  • 22 - The Kill Switch.mp4
    02:16
  • 23 - Starting the Windows Service.mp4
    01:48
  • 24 - Unload Resources used in the Attack.mp4
    03:47
  • 25 - Decrypting the Encrypted DLL Component.mp4
    02:25
  • 26 - Key Generation and Encryption of User Files.mp4
    03:46
  • 27 - What does WannaCry Encrypt.mp4
    01:34
  • 28 - Additional Processes in the Attack.mp4
    02:01
  • 29 - Increasing Impact and Preventing Recovery.mp4
    01:16
  • 30 - Unveiling Command and Control Communication.mp4
    02:47
  • 31 - How much money did attackers collect.mp4
    02:24
  • 32 - Why is the data not Recoverable.mp4
    02:16
  • 33 - The Worm Component Propagation of WannaCry.mp4
    02:40
  • 34 - Preventing WannaCry Safeguarding Your Systems.mp4
    02:58
  • 35 - Final Thoughts on WannaCry.mp4
    00:35
  • 3 - Pegasus Quiz.html
  • 36 - What is Spyware.mp4
    06:30
  • 37 - Introduction to Pegasus Spyware.mp4
    04:40
  • 38 - Pegasus Device Infection.mp4
    03:24
  • 39 - Device Exploit Trident Vulnerability.mp4
    05:15
  • 40 - Agent Installation and Persistence.mp4
    02:28
  • 41 - User Device and Surveillance.mp4
    03:40
  • 42 - Data Exfiltration to Command and Control.mp4
    02:15
  • 43 - Pegasus Abuse.mp4
    01:50
  • 44 - Final Thoughts on Pegasus.mp4
    01:38
  • 45 - Course Summary.mp4
    01:56
  • Description


    Understanding End-to-End Cyber Attack Architectures for Enhanced Security Awareness

    What You'll Learn?


    • Case studies detailing motivation, attacker, end-to-end architecture and consequences of the attack
    • Stuxnet Worm
    • WannaCry Ransomware
    • Pegasus Spyware

    Who is this for?


  • Beginners or technology enthusiasts interested in understanding the mechanics of major cyber attacks
  • Anyone curious about the evolving landscape of cyber threats and countermeasures
  • Students aiming to explore the ethical implications of digital surveillance
  • Individuals interested in enhancing their online safety and privacy
  • What You Need to Know?


  • Basic understanding of computer technologies
  • Basic understanding of security concepts like encryption
  • Curiosity about cyber security
  • More details


    Description

    Dive into the intriguing realm of cyber security with our comprehensive course on three notorious case studies: Stuxnet, WannaCry, and Pegasus. This course is designed to provide a captivating exploration of these major cyber-attacks, offering insights into their technical intricacies, real-world implications, and the broader lessons they teach us about digital security.


    What You'll Learn:

    Stuxnet Unveiled: Uncover the fascinating story of Stuxnet, a highly sophisticated worm that targeted industrial systems and disrupted nuclear facilities. Explore its complex architecture, understand its potential impact on the physical world, and grasp the significance of targeted cyber-attacks.

    WannaCry Unleashed: Delve into the world of ransomware with the WannaCry case study. Gain insights into how this global attack exploited vulnerabilities, encrypted data, and demanded ransom payments. Learn about cyber hygiene, the importance of timely software updates, and the crucial role of proactive security measures.

    Pegasus Surveillance: Explore the realm of high-tech spyware through the lens of Pegasus. Understand the delivery methods, architecture, and surveillance capabilities of this advanced software. Examine the ethical implications of surveillance and its impact on personal privacy in the digital age.


    Course Highlights:

    ✓ Engaging Case Studies: Immerse yourself in real-world stories of cyber-attacks that have made headlines and shaped the cybersecurity landscape.

    ✓ Accessible Content: We break down complex technical concepts into easily understandable explanations, making it suitable for beginners and tech enthusiasts alike.

    ✓ Practical Insights: Gain practical insights into cyber attack prevention, ethical considerations, and the importance of maintaining a vigilant online presence.

    ✓ Expert Guidance: Learn from experienced instructors with a deep understanding of cyber security and real-world attack scenarios.

    ✓ Interactive Learning: Engage with quizzes, discussions, and case study analyses to reinforce your understanding and enhance your learning experience.


    By the end of this course, you'll not only be well-versed in the stories of Stuxnet, WannaCry, and Pegasus, but you'll also have a broader understanding of the evolving cyber threat landscape and the measures necessary to protect yourself and your digital assets. Join us on this educational journey and equip yourself with essential knowledge for navigating the complex world of cyber security. Enroll today and take the first step towards safeguarding your digital presence.

    Who this course is for:

    • Beginners or technology enthusiasts interested in understanding the mechanics of major cyber attacks
    • Anyone curious about the evolving landscape of cyber threats and countermeasures
    • Students aiming to explore the ethical implications of digital surveillance
    • Individuals interested in enhancing their online safety and privacy

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Cloud Shikshak
    Cloud Shikshak
    Instructor's Courses
    CloudShikshak is created to help anyone learn about cloud technologies. We are a group of experienced instructors and software architects with multiple certifications and practical experience in AWS, Azure and other industry technologies. Our focus is to create high quality and engaging content for our students to make learning about cloud technologies as easy as possible.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 45
    • duration 2:04:10
    • Release Date 2023/10/04