Tags
Language
Tags
November 2024
Su Mo Tu We Th Fr Sa
27 28 29 30 31 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30

Ransomware Protection+ | Defense And Response Training

Posted By: ELK1nG
Ransomware Protection+ | Defense And Response Training

Ransomware Protection+ | Defense And Response Training
Published 11/2024
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 387.10 MB | Duration: 0h 47m

Complete Guide to Building Resilient Defenses Against Ransomware Threats

What you'll learn

Understand Ransomware Threats Inside and Out

Reduce Organization’s Vulnerability to Ransomware

Strengthening Defenses with Practical, Hands-On Skills

Detect and Respond to Ransomware Incidents with Confidence

Requirements

Basic Understanding of IT and Cybersecurity Concepts

Experience with Network and System Administration (Preferred)

Description

Protecting your organization from ransomware threats has never been more critical. Ransomware Protection+ is a comprehensive course that equips you with the skills, knowledge, and strategies to prevent, detect, and respond to ransomware attacks effectively. Designed for cybersecurity professionals, IT administrators, security managers, and anyone interested in enhancing their defense capabilities, this course takes you step-by-step through practical, real-world approaches to ransomware protection.What You’ll LearnIn this course, you’ll start with the basics, exploring what ransomware is, how it operates, and the tactics attackers use to infiltrate networks. From there, you’ll dive into advanced defense strategies, including endpoint hardening, network segmentation, access control, and secure backup practices. You’ll also master detection and monitoring techniques, including how to leverage Security Information and Event Management (SIEM) systems, set up alerts, and develop ransomware-specific incident response plans.Hands-On Learning with Real-World ExamplesRansomware Protection+ is packed with hands-on exercises, simulations, and case studies of high-profile ransomware attacks, such as WannaCry, NotPetya, and Colonial Pipeline. By analyzing these real-world incidents, you’ll gain insight into the strengths and weaknesses of each response and learn how to apply these lessons to strengthen your organization’s defenses.Key TakeawaysBy the end of this course, you’ll be able to:Understand ransomware fundamentals and common attack vectors.Implement proven techniques to reduce the attack surface, secure endpoints, and protect credentials.Configure multi-factor authentication (MFA), network segmentation, and secure backups to create a robust defense system.Develop and test an effective incident response plan to minimize damage in the event of an attack.Analyze post-attack scenarios to identify weaknesses and build a proactive, ransomware-resilient cybersecurity posture.

Overview

Section 1: Welcome to Ransomware Protection+

Lecture 1 Welcome

Lecture 2 What You’ll Learn in This Course

Section 2: Introduction to Ransomware

Lecture 3 What is Ransomware

Lecture 4 Common Attack Vectors

Lecture 5 Ransomware Propagation Methods

Section 3: Identifying and Reducing the Attack Surface

Lecture 6 Identity and Access Management (IAM)

Lecture 7 Network Infrastructure Hardening

Section 4: Endpoint Hardening and Protection

Lecture 8 Segmenting Endpoints

Lecture 9 Remote Desktop Protocol (RDP) Hardening

Section 5: Credential Protection and Privileged Account Security

Lecture 10 Reducing Credential Exposure

Lecture 11 Domain Controller Protection

Section 6: Virtualization and Backup Infrastructure Hardening

Lecture 12 Securing Virtualization Platforms

Lecture 13 Backup Infrastructure Protection

Section 7: Detection, Monitoring, and Response Strategies

Lecture 14 SIEM and Logging

Lecture 15 Response and Containment Strategies

Section 8: Planning and Testing Ransomware Recovery

Lecture 16 Developing a Recovery Plan

Lecture 17 Drills and Testing

Section 9: Threat Intelligence and Ransomware Trends

Lecture 18 Understanding Threat Intelligence

Lecture 19 Current Ransomware Trends

Section 10: Building a Human Firewall – User Awareness and Training

Lecture 20 The Role of Employees in Ransomware Prevention

Lecture 21 Interactive Training and Phishing Simulations

Section 11: Advanced Incident Response Planning

Lecture 22 Developing a Ransomware-Specific Incident Response Plan

Lecture 23 Rapid Containment and Analysis

Section 12: Legal and Ethical Considerations in Ransomware Response

Lecture 24 Understanding Legal Obligations

Lecture 25 Ethical Questions and Decision-Making

Section 13: Post-Attack Analysis and Lessons Learned

Lecture 26 Conducting a Post-Attack Analysis

Lecture 27 Improving Your Defense Based on Lessons Learned

Section 14: Case Studies of Major Ransomware Attacks

Lecture 28 Case Study – WannaCry Ransomware Attack (2017)

Lecture 29 Case Study – NotPetya Ransomware Attack (2017)

Lecture 30 Case Study – Ryuk Ransomware Attack on Hospitals (2018–2020)

Lecture 31 Case Study – Colonial Pipeline Ransomware Attack (2021)

Lecture 32 Case Study – Kaseya VSA Supply Chain Attack (2021)

Lecture 33 Summary of Case Study Learnings

Section 15: Conclusion

Lecture 34 Key Takeaways and Final Thoughts

Lecture 35 Thank You for Joining Ransomware Protection+

Section 16: Ransomware Protection+ Exam

IT and Cybersecurity Professionals,Security Leaders and Managers,Small Business Owners and IT Consultants,Aspiring Cybersecurity Professionals,Anyone Interested in Ransomware Protection