Time
49 minutes
Difficulty
Intermediate
CEU/CPE
1

Video Transcription

00:01
Hello and welcome to the course. My name is David Koepp. Radius. This is just an introductory video to the following two videos. So Number one
00:09
what we're gonna be going through is a simple example of what a malware attack would be in this specific example than our attack is gonna encrypt the files in a secondary video. What? We're gonna be doing a showcasing how ransomware attack would work
00:25
in the secondary video. What I've done is I've modified the content to basically show how such an attack would occur.
00:32
So going forward again after this is demonstrated in future labs and videos will go ahead and deep dive and find everything that we can do. Tow. Understand? Number one. What? Um, our attack is secondary. Would've ransomware attack is third. How to deflect? Um, our attack Fourth,
00:51
have a deflect a ransomware attack
00:53
without having to input any kind of money. Etcetera. Again, all for ethical purpose is very excited to have you guys on board and let's go ahead and deep dive into the next two videos. Thank you very much.

Up Next

Malware Threats

This malware analysis training course covers basic information about things like viruses, worms, Trojans, ransomware, and more.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor
Instructor Profile Image
Dave Kupratis
Instructor