Ransomware Protection+ | Defense And Response Training
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 387.10 MB | Duration: 0h 47m
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 387.10 MB | Duration: 0h 47m
Complete Guide to Building Resilient Defenses Against Ransomware Threats
What you'll learn
Understand Ransomware Threats Inside and Out
Reduce Organization’s Vulnerability to Ransomware
Strengthening Defenses with Practical, Hands-On Skills
Detect and Respond to Ransomware Incidents with Confidence
Requirements
Basic Understanding of IT and Cybersecurity Concepts
Experience with Network and System Administration (Preferred)
Description
Protecting your organization from ransomware threats has never been more critical. Ransomware Protection+ is a comprehensive course that equips you with the skills, knowledge, and strategies to prevent, detect, and respond to ransomware attacks effectively. Designed for cybersecurity professionals, IT administrators, security managers, and anyone interested in enhancing their defense capabilities, this course takes you step-by-step through practical, real-world approaches to ransomware protection.What You’ll LearnIn this course, you’ll start with the basics, exploring what ransomware is, how it operates, and the tactics attackers use to infiltrate networks. From there, you’ll dive into advanced defense strategies, including endpoint hardening, network segmentation, access control, and secure backup practices. You’ll also master detection and monitoring techniques, including how to leverage Security Information and Event Management (SIEM) systems, set up alerts, and develop ransomware-specific incident response plans.Hands-On Learning with Real-World ExamplesRansomware Protection+ is packed with hands-on exercises, simulations, and case studies of high-profile ransomware attacks, such as WannaCry, NotPetya, and Colonial Pipeline. By analyzing these real-world incidents, you’ll gain insight into the strengths and weaknesses of each response and learn how to apply these lessons to strengthen your organization’s defenses.Key TakeawaysBy the end of this course, you’ll be able to:Understand ransomware fundamentals and common attack vectors.Implement proven techniques to reduce the attack surface, secure endpoints, and protect credentials.Configure multi-factor authentication (MFA), network segmentation, and secure backups to create a robust defense system.Develop and test an effective incident response plan to minimize damage in the event of an attack.Analyze post-attack scenarios to identify weaknesses and build a proactive, ransomware-resilient cybersecurity posture.
Overview
Section 1: Welcome to Ransomware Protection+
Lecture 1 Welcome
Lecture 2 What You’ll Learn in This Course
Section 2: Introduction to Ransomware
Lecture 3 What is Ransomware
Lecture 4 Common Attack Vectors
Lecture 5 Ransomware Propagation Methods
Section 3: Identifying and Reducing the Attack Surface
Lecture 6 Identity and Access Management (IAM)
Lecture 7 Network Infrastructure Hardening
Section 4: Endpoint Hardening and Protection
Lecture 8 Segmenting Endpoints
Lecture 9 Remote Desktop Protocol (RDP) Hardening
Section 5: Credential Protection and Privileged Account Security
Lecture 10 Reducing Credential Exposure
Lecture 11 Domain Controller Protection
Section 6: Virtualization and Backup Infrastructure Hardening
Lecture 12 Securing Virtualization Platforms
Lecture 13 Backup Infrastructure Protection
Section 7: Detection, Monitoring, and Response Strategies
Lecture 14 SIEM and Logging
Lecture 15 Response and Containment Strategies
Section 8: Planning and Testing Ransomware Recovery
Lecture 16 Developing a Recovery Plan
Lecture 17 Drills and Testing
Section 9: Threat Intelligence and Ransomware Trends
Lecture 18 Understanding Threat Intelligence
Lecture 19 Current Ransomware Trends
Section 10: Building a Human Firewall – User Awareness and Training
Lecture 20 The Role of Employees in Ransomware Prevention
Lecture 21 Interactive Training and Phishing Simulations
Section 11: Advanced Incident Response Planning
Lecture 22 Developing a Ransomware-Specific Incident Response Plan
Lecture 23 Rapid Containment and Analysis
Section 12: Legal and Ethical Considerations in Ransomware Response
Lecture 24 Understanding Legal Obligations
Lecture 25 Ethical Questions and Decision-Making
Section 13: Post-Attack Analysis and Lessons Learned
Lecture 26 Conducting a Post-Attack Analysis
Lecture 27 Improving Your Defense Based on Lessons Learned
Section 14: Case Studies of Major Ransomware Attacks
Lecture 28 Case Study – WannaCry Ransomware Attack (2017)
Lecture 29 Case Study – NotPetya Ransomware Attack (2017)
Lecture 30 Case Study – Ryuk Ransomware Attack on Hospitals (2018–2020)
Lecture 31 Case Study – Colonial Pipeline Ransomware Attack (2021)
Lecture 32 Case Study – Kaseya VSA Supply Chain Attack (2021)
Lecture 33 Summary of Case Study Learnings
Section 15: Conclusion
Lecture 34 Key Takeaways and Final Thoughts
Lecture 35 Thank You for Joining Ransomware Protection+
Section 16: Ransomware Protection+ Exam
IT and Cybersecurity Professionals,Security Leaders and Managers,Small Business Owners and IT Consultants,Aspiring Cybersecurity Professionals,Anyone Interested in Ransomware Protection