- Course
- Security
Cybersecurity Threats: Ransomware
If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
What you'll learn
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you'll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you'll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you'll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you'll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you'll have all the necessary skills and knowledge to manage the threat of ransomware.
Table of contents
- Overview | 2m 32s
- Definition and Types of Ransomware | 5m 16s
- The Ransomware Timeline | 5m 57s
- What Is Ransomware 30,000 ft. View? | 3m 8s
- How Big Is the Problem? | 5m 9s
- Ransomware Victims | 5m 55s
- Module Progress Checkpoint | 34s
- Demo of Real World Ransomware Attack | 6m 44s
- Variations of Ransomware | 3m 22s
- Summary | 1m 58s
About the author
Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.