Cybersecurity Threats: Ransomware

If you're a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
Course info
Rating
(23)
Level
Intermediate
Updated
April 26, 2017
Duration
2h 31m
Table of contents
Description
Course info
Rating
(23)
Level
Intermediate
Updated
April 26, 2017
Duration
2h 31m
Description

Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years. In this course, Cybersecurity Threats: Ransomware, you'll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files. First, you'll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you'll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you'll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked. By the end of this course, you'll have all the necessary skills and knowledge to manage the threat of ransomware.

About the author
About the author

Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.

More from the author
Cybersecurity Threats: Insider Threats
Beginner
2h 2m
13 Oct 2017
Transcript
Transcript

Hi there, my name is Richard Harpur, welcome to my course Cybersecurity Threats: Ransomware.

I am a Certified Information Security Manager and my day job is all about managing IT risks.

There is no escaping ransomware it is everywhere and toolkits to perform ransomware attacks are being sold by criminals for as little as a couple of hundred dollars.This has resulted in a surge of attacks.

Whether you’re a software developer wanting to protect valuable source code and data, an IT admin responsible for protecting an entire network or just want to help yourself or a friend out who has become a victim of ransomware this course if for you to help you prepare and be proactive – before an attack. It’s important the you learn how to prepare before you suffer an attack, this ensure you have the maximum chance of recovering your files..

I’m going to start with showing your a real world ransomware attack as it happens and the impact is has on data files.

As we progress through this course:

  • You will learn the key entry points for ransomware infection.
  • How to defend your network.
  • How to identify and contain a ransomware attack.
  • A key bonus is that I will take you through a joint initiative by law enforcement and industry vendors that provides you with resources to help recover your files without paying a ransom.
  • And factors to consider before paying the ransom – its not always as straight forward as it might first think, not its not like purchasing goods from an on-line store. After this course you’re been fully informed about the pitfalls. I’ll walk you through what you need to know.
By the end this course, you’ll have fully informed and know what to do to defend your systems from an attack, and the best approaches to recover data should you fall victim to an attack.

And the best part, you don’t need to have any knowledge of specific tools or processes to complete this course, just jump straight in and start learning how to stay safe.

I hope you’ll join me on this journey to learn implementing a security and assessment process course, at Pluralsight.