Home Specialist skills Security FOR528: Ransomware and Cyber Extortion
FOR528: Ransomware and Cyber Extortion
-
How human-operated ransomware (HumOR) operators have evolved into well-tuned attack teams.
-
How best to prepare your organization against the threat of HumOR.
-
How to identify the tools that HumOR operators often use to get into and perform post-exploitation activities during a ransomware attack.
-
How to respond when ransomware is running actively within your environment.
-
What steps to take following a ransomware attack.
Overview
Off the shelf (OTS)
FOR528: Ransomware for Incident Responders provides the hands-on training required for those who may need to respond to ransomware incidents. The term "Ransomware" no longer refers to a simple encryptor that locks down resources. The advent of Human-Operated Ransomware (HumOR) along with the evolution of Ransomware-as-a-Service (RaaS) have created an entire ecosystem that thrives on hands-on the keyboard, well-planned attack campaigns. Our course uses deftly devised, real-world attacks and their subsequent forensic artifacts to provide you, the analyst, with all that you need to respond when the threat become a reality.
Delivery method
Face to face
Virtual
Digital
Course duration
28 hours
Competency level
Working

Delivery method
-
Face to face
-
Virtual
-
Digital
Course duration
28 hours
Competency level
-
Working
