A Guide to Ransomware Protection
4.2 (92 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,153 students enrolled

A Guide to Ransomware Protection

Ransomware Measures and Incident Handling
4.2 (92 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
13,153 students enrolled
Created by Rahul Jamgade
Last updated 5/2020
English
English [Auto]
Current price: $16.99 Original price: $24.99 Discount: 32% off
23 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • It talks about Introduction to Ransomware, Types of Ransomware, How it works, Precautionary meassures, Preparation against ransomware attacks and handling any ransomware incident.
Requirements
  • Basic knowledge in IT sytems and interest in Cyber security Domain
Description

In the recent years ransomware became talk aof the town and is creating big issues for small as well as big organizations and hence it is important to understand all about the ransomware from primariy organizations point of view as well as Individual's point o view to a certain level.One should know how the ransomware works and how to protect our organization against ransomware and also what can be done in case of ransomware attack. I tries to cover all teh topics over here.

It talks about Introduction to Ransomware, Types of Ransomware, How it works, Precautionary meassures, Preparation against ransomware attacks and handling any ransomware incident.

Students who are interested in learning cyber security specific topics and interested in working with organizations in the IT security domain.

One should have basic understanding of systems and networks. Should be proficient in computers.

No special requirements except a computer or a laptop or mobile phone. In addition one need speaker or headphone for listening purpose.

Students with interest in the cyber security domain should opt for this course. However it does not talks about how to create or operate the ransomware. Please use it for benifiting your organization and to get understanding about teh topic.

Students will understand how to deal with ransomware and also prevention measures. They will understand the options available for recovery and provide them with the confidence required for dealing with ransomware. 

Ransomware being a prime topic nowadays and also companies specificlly requires people with good amount of dealing with ransomware and hence student with sufficient knowledge with have an edge over others.

It can help students to get various job roles including security analyst, security engineer, incident handling team mebers etc..

Who this course is for:
  • Students who are interested in learning cyber security specific topics and interested in working with organizations in the IT security domain.
Course content
Expand all 33 lectures 02:04:42
+ Types of Ransomware
5 lectures 26:25
Ransomware types and their examples
09:21
Crypto Ransomware - Screenshot
00:29
Ransomware as a service
05:24
Mobile ransomware
03:57
Other ransomwares
07:14
+ Modus Operandi
7 lectures 09:38
How it works
00:55
Methods of Infections
01:18
Security key exchange
00:31
Making Things Inaccessible
01:19
Extortion
00:39
The Outcome
00:50
Bypass Technique, Anonymity and Hiding
04:06
+ Precautionary and Preventive Measures
5 lectures 29:45
Technical Precautions
11:53
Administrative Precautions
05:30
Management Precautions
04:00
Other Precautions
02:56
Do’s and Dont’s
05:26
+ Preparation against Ransomware
3 lectures 22:10
Preparation Stage - Part 1
06:08
Preparation Stage - Part 2
10:54
Preparation Stage - Part 3
05:08
+ Infected ? What to Do?
7 lectures 19:38
Symptoms and Approach
02:11
What to do? Technical
02:30
What to do ? Administrative
02:24
What to do ? Management
04:08
Ransom Payment
02:41
Data Decryption and Restoration
01:41
Ransomware recovery Tools and Websites
04:03