If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you'll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you'll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you'll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you'll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you'll have all the necessary skills and knowledge to manage the threat of ransomware.
Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.
Course Overview Hi there, my name is Richard Harpur and welcome to my course Cybersecurity Threats: Ransomware. I'm a certified information security manager and my day job is all about managing IT risks, and there's no escaping the risk of ransomware, it's everywhere. And toolkits to perform ransomware attacks are now being sold by criminals for as little as a couple of hundred dollars. This has resulted in a surge of attacks and no one is immune. Proactive users prepare for a ransomware attack in advance. This minimizes their chance of losing data and provides you with the maximum chance of recovering your files. As we progress through this course you will learn the key entry points for ransomware infections. You learn how to defend your network and how to identify and contain a ransomware attack. By the end of this course you'll be fully informed and know how to defend your systems from attack and the best approaches to recover your data should you fall victim to ransomware. I hope you'll join me on this journey to learn all about cybersecurity threats: ransomware at Pluralsight.