Tags
Language
Tags
December 2024
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31 1 2 3 4

Ransomware Essentials For Absolute Beginners In 60 Minutes!

Posted By: ELK1nG
Ransomware Essentials For Absolute Beginners In 60 Minutes!

Ransomware Essentials For Absolute Beginners In 60 Minutes!
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 530.20 MB | Duration: 0h 39m

Ransomware Resilience: Empowering Managers and Non-Techies

What you'll learn

Management: Learn high level cybersecurity measures within 60 minutes

IT-manager: Learn security best practices based on proven model

Business managers: non-technical employees through basic security measures

Everyone else: best practices on protecting your organisation against ransomware

Requirements

Open mind and willingness to learn new practices

60 minutes time to view the course and 1 minute to leave a great review

Description

How do you start protecting your most precious resources? If you cannot answer this question, this course is made for YOU! Within 1 hour you will understand the most controls you need to implement to prevent and limit the impact of a Ransomware attack.Course Outline - This course covers 4 phases with several controls per phase:1. Identify and PreventEducation and awarenessIdentify and classify dataDevelop and enforce policiesHarden OS, networks, apps, etc.2. DetectionDetect and block emails/attachmentsScan, record and assess logsTest control (also for third parties)3. ResponseRepair, Repave & RotateUnplug, scan and decryptBusiness continuity4. RecoveryDisaster recoveryTest recovery procedures regularly So, after following this course you'll Understand Essential Concepts, Explain Them and Earn More Money"If you want to make a promotion, your effectiveness depends on your ability to reach others through the spoken and written word" (P. Drucker). What's does this course not deliver? - No technical how-to video manuals, because this course is created for absolute beginners!- No detailed settings of how to configure baselines, servers, etc., because this course is created for absolute beginners!- No coding examples, because this course is created for absolute beginners!Why learn about Ransomware from me?This course is created by Soerin Bipat. He is the founder of Security Repo and has more than a decade experience in IT security and teaching and has now designed a course that you'll love. Soerin is a top-rated instructor and has taught thousands of students around the world, and can't wait to serve you.Besides experience as an IT security consultant he holds the following certifications: Certified Secure Software Lifecycle professional (CSSLP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Auditor (CISA)Certified Information Privacy Professional (CIPP / Europe)Certified SCRUM MasterTogaf FoundationArchimateISO 27001 Lead AuditorISO 27001 Lead ImplementerLeading Scaled Agile FrameworkAzure Fundamentals (AZ-900)PRINCE 2 foundationInternational Software Testing Qualifications Board (ISTQB)My Happiness GuaranteeIf you aren't happy with your purchase, I have a 30-day 100% money back guarantee. There's literally no reason to hesitate!Go ahead and click the enrol button, and I'll see you in lesson 1!Cheers,Soerin

Overview

Section 1: Introduction

Lecture 1 What is ransomware?

Lecture 2 What is the impact of ransomware?

Lecture 3 How difficult is it to deploy a ransomware attack?

Lecture 4 Management summary of the course!

Section 2: Phase: Identification and prevention

Lecture 5 Education and awareness training

Lecture 6 Identify and classify data

Lecture 7 Develop and enforce security policy

Lecture 8 Harden operating systems, networks, applications, etc.

Section 3: Phase: Detection

Lecture 9 Detect & block fraudulent email and attachments

Lecture 10 Scan, record and assess logs

Lecture 11 Test controls (also third party)

Section 4: Phase: Response

Lecture 12 Rotate, Repave and Repair

Lecture 13 Unplug, scan and decrypt

Lecture 14 Business continuity

Section 5: Phase: Recover

Lecture 15 Disaster recovery planning and training

Lecture 16 Test recovery procedures regularly

General management (CEO, COO, CFO, CTO, CIO, CISO, CxO),IT managers (service manager, product owners, etc),Everyone working with computers (mobile, laptop, tablet, desktop, etc.)