![]() |
|
Ransomware Essentials For Absolute Beginners In 60 Minutes! - Printable Version +- Softwarez.Info - Software's World! (https://softwarez.info) +-- Forum: Library Zone (https://softwarez.info/Forum-Library-Zone) +--- Forum: Video Tutorials (https://softwarez.info/Forum-Video-Tutorials) +--- Thread: Ransomware Essentials For Absolute Beginners In 60 Minutes! (/Thread-Ransomware-Essentials-For-Absolute-Beginners-In-60-Minutes) |
Ransomware Essentials For Absolute Beginners In 60 Minutes! - Farid - 09-06-2023 ![]() Ransomware Essentials For Absolute Beginners In 60 Minutes! Published 9/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz Language: English | Size: 530.20 MB | Duration: 0h 39m Ransomware Resilience: Empowering Managers and Non-Techies What you'll learn Management: Learn high level cybersecurity measures within 60 minutes IT-manager: Learn security best practices based on proven model Business managers: non-technical employees through basic security measures Everyone else: best practices on protecting your organisation against ransomware Requirements Open mind and willingness to learn new practices 60 minutes time to view the course and 1 minute to leave a great review Description How do you start protecting your most precious resources? If you cannot answer this question, this course is made for YOU! Within 1 hour you will understand the most controls you need to implement to prevent and limit the impact of a Ransomware attack.Course Outline - This course covers 4 phases with several controls per phase:1. Identify and PreventEducation and awarenessIdentify and classify dataDevelop and enforce policiesHarden OS, networks, apps, etc.2. DetectionDetect and block emails/attachmentsScan, record and assess logsTest control (also for third parties)3. ResponseRepair, Repave & RotateUnplug, scan and decryptBusiness continuity4. RecoveryDisaster recoveryTest recovery procedures regularly So, after following this course you'll Understand Essential Concepts, Explain Them and Earn More Money"If you want to make a promotion, your effectiveness depends on your ability to reach others through the spoken and written word" (P. Drucker). What's does this course not deliver? - No technical how-to video manuals, because this course is created for absolute beginners!- No detailed settings of how to configure baselines, servers, etc., because this course is created for absolute beginners!- No coding examples, because this course is created for absolute beginners!Why learn about Ransomware from me?This course is created by Soerin Bipat. He is the founder of Security Repo and has more than a decade experience in IT security and teaching and has now designed a course that you'll love. Soerin is a top-rated instructor and has taught thousands of students around the world, and can't wait to serve you.Besides experience as an IT security consultant he holds the following certifications: Certified Secure Software Lifecycle professional (CSSLP)Certified Information Systems Security Professional (CISSP)Certified Information Systems Auditor (CISA)Certified Information Privacy Professional (CIPP / Europe)Certified SCRUM MasterTogaf FoundationArchimateISO 27001 Lead AuditorISO 27001 Lead ImplementerLeading Scaled Agile FrameworkAzure Fundamentals (AZ-900)PRINCE 2 foundationInternational Software Testing Qualifications Board (ISTQB)My Happiness GuaranteeIf you aren't happy with your purchase, I have a 30-day 100% money back guarantee. There's literally no reason to hesitate!Go ahead and click the enrol button, and I'll see you in lesson 1!Cheers,Soerin Overview Section 1: Introduction Lecture 1 What is ransomware? Lecture 2 What is the impact of ransomware? Lecture 3 How difficult is it to deploy a ransomware attack? Lecture 4 Management summary of the course! Section 2: Phase: Identification and prevention Lecture 5 Education and awareness training Lecture 6 Identify and classify data Lecture 7 Develop and enforce security policy Lecture 8 Harden operating systems, networks, applications, etc. Section 3: Phase: Detection Lecture 9 Detect & block fraudulent email and attachments Lecture 10 Scan, record and assess logs Lecture 11 Test controls (also third party) Section 4: Phase: Response Lecture 12 Rotate, Repave and Repair Lecture 13 Unplug, scan and decrypt Lecture 14 Business continuity Section 5: Phase: Recover Lecture 15 Disaster recovery planning and training Lecture 16 Test recovery procedures regularly General management (CEO, COO, CFO, CTO, CIO, CISO, CxO),IT managers (service manager, product owners, etc),Everyone working with computers (mobile, laptop, tablet, desktop, etc.) Tut (530.23 MB) KatFile Link(s) RapidGator Link(s) |