MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Cybersecurity Threats: Ransomware

Course Summary

If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.


  • +

    Course Syllabus

    Course Overview
    - 1m 23s

    —Course Overview 1m 23s
    What Is Ransomware?
    - 40m 40s

    —Overview 2m 32s
    —Definition and Types of Ransomware 5m 16s
    —The Ransomware Timeline 5m 57s
    —What Is Ransomware 30,000 ft. View? 3m 8s
    —How Big Is the Problem? 5m 9s
    —Ransomware Victims 5m 55s
    —Module Progress Checkpoint 0m 34s
    —Demo of Real World Ransomware Attack 6m 44s
    —Variations of Ransomware 3m 22s
    —Summary 1m 58s
    Ransomware Entry Points
    - 21m 20s
    Incident Response: Detection and Containment
    - 14m 28s
    Incident Response: Eradication and Recovery
    - 48m 3s
    Countermeasures and Preparing Your Incident Response
    - 25m 49s


Course Fee:
USD 29

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

This course is listed under Development & Implementations and IT Security & Architecture Community

Related Posts:

Attended this course?

Back to Top

 
Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url