Email communication is vital for businesses. Ransomware creators use email to get into a system via phishing attacks. Learn about Sender Policy Framework, DomainKeys Identified Mail, and Domain-based Message Authentication Reporting and Conformance, which
- [Instructor] Email communication is vital for businesses.…However, a large percentage of email…that comes into an organization is abusive,…and includes junk mail, spam and malware.…Nearly all abusive email has a fake sender address…which is done to conceal the sender's true address.…Ransomware creators use spoofed email…to get into an organization via phishing attacks.…A reputation is a method of assuring…appropriate email traffic and preventing abusive email.…
With a reputation-based solution, you can see…that this email wants to be delivered to an organization.…The organization goes to the cloud to check…the reputation of that IP address.…By reputation, it assures that that website is okay…and the email can be delivered.…Reputation-based systems like Spamhaus or Spamcop,…monitor and blacklist IP addresses.…Here you can see there are a lot of resources…to prevent abusive email.…
There are a number of block lists,…including the Spamhaus Block List, Exploits Block List,…Policy Block List and Domain Block List.…
- How ransomware works
- Types of ransomware
- Safeguarding Windows
- Securing your router
- Updating software and operating systems
- Spam, phishing, and spoofing
- Reporting ransomware
Skill Level Beginner
Ransomware: Practical Reverse Engineeringwith Malcolm Shore1h 22m Intermediate
Malware: Defense and Responsewith Scott M Burrell40m 46s Intermediate
Windows Performance Toolkit: Malware Analysiswith Thomas Pantels1h 4m Intermediate
1. Ransomware Overview
2. Types of Ransomware
3. Safeguarding Windows
4. Good Practice
Next steps1m 25s
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.