- Course
Cybersecurity Threats: Ransomware
If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
- Course
Cybersecurity Threats: Ransomware
If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
Get started today
Access this course and other top-rated tech content with one of our business plans.
Try this course for free
Access this course and other top-rated tech content with one of our individual plans.
This course is included in the libraries shown below:
- Security
What you'll learn
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you'll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you'll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you'll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you'll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you'll have all the necessary skills and knowledge to manage the threat of ransomware.
Cybersecurity Threats: Ransomware
-
Overview | 2m 32s
-
Definition and Types of Ransomware | 5m 16s
-
The Ransomware Timeline | 5m 57s
-
What Is Ransomware 30,000 ft. View? | 3m 8s
-
How Big Is the Problem? | 5m 9s
-
Ransomware Victims | 5m 55s
-
Module Progress Checkpoint | 34s
-
Demo of Real World Ransomware Attack | 6m 44s
-
Variations of Ransomware | 3m 22s
-
Summary | 1m 58s