Save
Saving
  • C
    Chiraag Swaly

    @Angie said in CEH V9 Labs:

    @Chiraag-Swaly CSA+ labs are available NOW!

    Amazing. Thank you :-)

    posted in Security read more
  • C
    Chiraag Swaly

    @Angie Thank you. That is very helpful. Would you be able to confirm a date for labs for CSA+ as well?

    posted in Security read more
  • C
    Chiraag Swaly

    Hello,

    Is there an ETA on the labs for CEH V9 please?

    @Angie said in CEH V9 Labs:

    @Michael-Ademosu
    Michael - the labs have not yet been updated for CEHv9. As soon as they are available we will attach them to the course. Thanks!

    posted in Security read more
  • C
    Chiraag Swaly

    @Ronnie-Wong

    Thanks for the very comprehensive response on this. I was wondering if you could point out to where I could get stats on how often people get affected by ransomware. Also your point below on paying the attacker suggests that sometimes conversations take place with the attackers to negotiate a release rate. I did not realise that this happens hence why I was keen to look at some stats but thanks for the detailed reply.
    @Ronnie-Wong said in Ransomware clean up:

    1. This only works with a good backup. If he doesn't happen to have that and needs that data. He will pay some or all of the ransom to get the data restored that is your only choice with the value of the data and the time you have if you do not have backups.. The double edged sword of ransomware is based on how well you've prepared for Disaster Recovery. If you've prepared for it, the ransomware helps you since they are the only ones who have the key and they encrypt with like a 4096 bit encryption. It means they have the key to a lockbox they'll no longer have access too and at the same time, anyone who tries to steal the data will have to deal with the 4096 bit encryption. But, if you don't have the backups, you must depend on the attacker's sense of doing business with his targets.

    posted in General Discussion read more