Tags
Language
Tags
July 2025
Su Mo Tu We Th Fr Sa
29 30 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31 1 2
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Ransomware Essentials For Absolute Beginners In 60 Minutes!

    Posted By: ELK1nG
    Ransomware Essentials For Absolute Beginners In 60 Minutes!

    Ransomware Essentials For Absolute Beginners In 60 Minutes!
    Published 9/2023
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 530.20 MB | Duration: 0h 39m

    Ransomware Resilience: Empowering Managers and Non-Techies

    What you'll learn

    Management: Learn high level cybersecurity measures within 60 minutes

    IT-manager: Learn security best practices based on proven model

    Business managers: non-technical employees through basic security measures

    Everyone else: best practices on protecting your organisation against ransomware

    Requirements

    Open mind and willingness to learn new practices

    60 minutes time to view the course and 1 minute to leave a great review

    Description

    How do you start protecting your most precious resources? If you cannot answer this question, this course is made for YOU! Within 1 hour you will understand the most controls you need to implement to prevent and limit the impact of a Ransomware attack.Course Outline - This course covers 4 phases with several controls per phase:1. Identify and PreventEducation and awarenessIdentify and classify dataDevelop and enforce policiesHarden OS, networks, apps, etc.2. DetectionDetect and block emails/attachmentsScan, record and assess logsTest control (also for third parties)3. ResponseRepair, Repave & RotateUnplug, scan and decryptBusiness continuity4. RecoveryDisaster recoveryTest recovery procedures regularly So, after following this course you'll Understand Essential Concepts, Explain Them and Earn More Money"If you want to make a promotion, your effectiveness depends on your ability to reach others through the spoken and written word" (P. Drucker). What's does this course not deliver? - No technical how-to video manuals, because this course is created for absolute beginners!- No detailed settings of how to configure baselines, servers, etc., because this course is created for absolute beginners!- No coding examples, because this course is created for absolute beginners!Why learn about Ransomware from me?This course is created by Soerin Bipat. He is the founder of Security Repo and has more than a decade experience in IT security and teaching and has now designed a course that you'll love. Soerin is a top-rated instructor and has taught thousands of students around the world, and can't wait to serve you.Besides experience as an IT security consultant he holds the following certifications: Certified Secure Software Lifecycle professional (CSSLP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Auditor (CISA)Certified Information Privacy Professional (CIPP / Europe)Certified SCRUM MasterTogaf FoundationArchimateISO 27001 Lead AuditorISO 27001 Lead ImplementerLeading Scaled Agile FrameworkAzure Fundamentals (AZ-900)PRINCE 2 foundationInternational Software Testing Qualifications Board (ISTQB)My Happiness GuaranteeIf you aren't happy with your purchase, I have a 30-day 100% money back guarantee. There's literally no reason to hesitate!Go ahead and click the enrol button, and I'll see you in lesson 1!Cheers,Soerin

    Overview

    Section 1: Introduction

    Lecture 1 What is ransomware?

    Lecture 2 What is the impact of ransomware?

    Lecture 3 How difficult is it to deploy a ransomware attack?

    Lecture 4 Management summary of the course!

    Section 2: Phase: Identification and prevention

    Lecture 5 Education and awareness training

    Lecture 6 Identify and classify data

    Lecture 7 Develop and enforce security policy

    Lecture 8 Harden operating systems, networks, applications, etc.

    Section 3: Phase: Detection

    Lecture 9 Detect & block fraudulent email and attachments

    Lecture 10 Scan, record and assess logs

    Lecture 11 Test controls (also third party)

    Section 4: Phase: Response

    Lecture 12 Rotate, Repave and Repair

    Lecture 13 Unplug, scan and decrypt

    Lecture 14 Business continuity

    Section 5: Phase: Recover

    Lecture 15 Disaster recovery planning and training

    Lecture 16 Test recovery procedures regularly

    General management (CEO, COO, CFO, CTO, CIO, CISO, CxO),IT managers (service manager, product owners, etc),Everyone working with computers (mobile, laptop, tablet, desktop, etc.)