Cybersecurity Threats: Ransomware

Pluralsight
Course Summary
If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
-
+
Course Description
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you'll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you'll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you'll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you'll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you'll have all the necessary skills and knowledge to manage the threat of ransomware.
-
+
Course Syllabus
Course Overview- 1m 23s
—Course Overview 1m 23sWhat Is Ransomware?- 40m 40s
—Overview 2m 32s
—Definition and Types of Ransomware 5m 16s
—The Ransomware Timeline 5m 57s
—What Is Ransomware 30,000 ft. View? 3m 8s
—How Big Is the Problem? 5m 9s
—Ransomware Victims 5m 55s
—Module Progress Checkpoint 0m 34s
—Demo of Real World Ransomware Attack 6m 44s
—Variations of Ransomware 3m 22s
—Summary 1m 58sRansomware Entry Points- 21m 20sIncident Response: Detection and Containment- 14m 28sIncident Response: Eradication and Recovery- 48m 3sCountermeasures and Preparing Your Incident Response- 25m 49s