If you’re a developer, IT admin, project manager, or a user, ransomware impacts you. Learn to identify infection points, recover files without paying a ransom, defend against and respond to attacks, and pitfalls if you do pay.
What you’ll learn
Ransomware attacks have surged recently. You see all types of organizations and users impacted by this threat. It is estimated that ransomware will increase in frequency and impact in the coming months and years.
In this course, Cybersecurity Threats: Ransomware, you’ll receive comprehensive knowledge of typical infection points where ransomware can get into your systems and understand the options you have to recover your encrypted files.
First, you’ll discover what tools are available, many of them free, to help you recover a system that has suffered a ransomware attack. Next, you’ll explore what you need to be aware of if you decide to pay the ransom to avoid some pitfalls. Finally, you’ll learn how to defend your network and system and create an incident response plan to have at the ready should your systems be attacked.
By the end of this course, you’ll have all the necessary skills and knowledge to manage the threat of ransomware.