Ransomware Essentials For Absolute Beginners In 60 Minutes!
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 530.20 MB | Duration: 0h 39m
Published 9/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 530.20 MB | Duration: 0h 39m
Ransomware Resilience: Empowering Managers and Non-Techies
What you'll learn
Management: Learn high level cybersecurity measures within 60 minutes
IT-manager: Learn security best practices based on proven model
Business managers: non-technical employees through basic security measures
Everyone else: best practices on protecting your organisation against ransomware
Requirements
Open mind and willingness to learn new practices
60 minutes time to view the course and 1 minute to leave a great review
Description
How do you start protecting your most precious resources? If you cannot answer this question, this course is made for YOU! Within 1 hour you will understand the most controls you need to implement to prevent and limit the impact of a Ransomware attack.Course Outline - This course covers 4 phases with several controls per phase:1. Identify and PreventEducation and awarenessIdentify and classify dataDevelop and enforce policiesHarden OS, networks, apps, etc.2. DetectionDetect and block emails/attachmentsScan, record and assess logsTest control (also for third parties)3. ResponseRepair, Repave & RotateUnplug, scan and decryptBusiness continuity4. RecoveryDisaster recoveryTest recovery procedures regularly So, after following this course you'll Understand Essential Concepts, Explain Them and Earn More Money"If you want to make a promotion, your effectiveness depends on your ability to reach others through the spoken and written word" (P. Drucker). What's does this course not deliver? - No technical how-to video manuals, because this course is created for absolute beginners!- No detailed settings of how to configure baselines, servers, etc., because this course is created for absolute beginners!- No coding examples, because this course is created for absolute beginners!Why learn about Ransomware from me?This course is created by Soerin Bipat. He is the founder of Security Repo and has more than a decade experience in IT security and teaching and has now designed a course that you'll love. Soerin is a top-rated instructor and has taught thousands of students around the world, and can't wait to serve you.Besides experience as an IT security consultant he holds the following certifications: Certified Secure Software Lifecycle professional (CSSLP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Auditor (CISA)Certified Information Privacy Professional (CIPP / Europe)Certified SCRUM MasterTogaf FoundationArchimateISO 27001 Lead AuditorISO 27001 Lead ImplementerLeading Scaled Agile FrameworkAzure Fundamentals (AZ-900)PRINCE 2 foundationInternational Software Testing Qualifications Board (ISTQB)My Happiness GuaranteeIf you aren't happy with your purchase, I have a 30-day 100% money back guarantee. There's literally no reason to hesitate!Go ahead and click the enrol button, and I'll see you in lesson 1!Cheers,Soerin
Overview
Section 1: Introduction
Lecture 1 What is ransomware?
Lecture 2 What is the impact of ransomware?
Lecture 3 How difficult is it to deploy a ransomware attack?
Lecture 4 Management summary of the course!
Section 2: Phase: Identification and prevention
Lecture 5 Education and awareness training
Lecture 6 Identify and classify data
Lecture 7 Develop and enforce security policy
Lecture 8 Harden operating systems, networks, applications, etc.
Section 3: Phase: Detection
Lecture 9 Detect & block fraudulent email and attachments
Lecture 10 Scan, record and assess logs
Lecture 11 Test controls (also third party)
Section 4: Phase: Response
Lecture 12 Rotate, Repave and Repair
Lecture 13 Unplug, scan and decrypt
Lecture 14 Business continuity
Section 5: Phase: Recover
Lecture 15 Disaster recovery planning and training
Lecture 16 Test recovery procedures regularly
General management (CEO, COO, CFO, CTO, CIO, CISO, CxO),IT managers (service manager, product owners, etc),Everyone working with computers (mobile, laptop, tablet, desktop, etc.)