Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Python
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Cybersecurity and Ransomware Fundamentals
Security Training Overview

This one-day course is designed to provide IT professionals with a fundamental understanding of cybersecurity, with a particular focus on ransomware. The course covers topics such as cybersecurity threats, encryption, authentication, authorization, and ransomware attacks, along with strategies for ransomware protection.

The course is suitable for both novice and experienced IT professionals. It's designed for individuals who may have experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. This includes administrators, developers, testers, analysts, and students.


Security Training Course Objectives

After this course a student should be able to

  • Understand the cybersecurity landscape
  • Describe how encryption works
  • Understand the difference between authorization and authentication
  • Discuss device-based threats
  • Understand networks and network-based threats
  • Discuss how applications can be exploited by cybercriminals
  • Discuss ransomware, the types of ransomware attacks, and ransomware families
  • Describe different ways to prevent ransomware
  • Understand common signs of ransomware attacks
  • Describe how to recover from ransomware attacks

Security Training Prerequisites

  • Basic awareness of IT, devices, and applications.

Security Training Course duration

1 day

Security Training Course outline

Module 1: Fundamentals of Cybersecurity

This module explains the fundamentals of cybersecurity. It will give the student an awareness of the cybersecurity landscape, how encryption, authentication and authorization work, and draws attention to different attack vectors that cybercriminals can exploit to carry out attacks and gain unauthorized access.

Lessons
  • An overview of cybersecurity
  • Basic introduction to encryption
  • How to verify your users and control their access
  • Network threats
  • Devices as threat vectors
  • Application vulnerabilities
Lab 1: Fundamentals of Cybersecurity
  • Paper-based exercise, break out session with scenario and discussion with the group on the outcome.
After completing this module, students will be able to:
  • Describe the cybersecurity landscape.
  • Discuss how encryption works.
  • Describe the differences between authentication and authorisation.
  • Describe different network types, the network threat landscape and how to protect them from cyberattack.
  • Describe what a device is, how much a device knows about you, and device-based threats.
  • Discuss how applications can be exploited to gain access
Module 2: The Basics of Ransomware

This module explains the basics of ransomware. Students will get a basic introduction to ransomware, how to protect against ransomware, and what can be done to effectively recover from a ransomware attack.

Lessons
  • Introduction to ransomware
  • How to protect against ransomware attacks
  • How to recover from a ramsomware attack
Lab 1: The Basics of Ransomware>
  • Paper-based exercise, break out session with scenario and discussion with the group on the outcome
After completing this module, students will be able to:
  • Understand ransomware
  • Describe different types of ransomware attacks
  • Discuss the ransomware families
  • Discuss how ransomware has become a business
  • Understand defense mechanisms against ransomware attacks
  • Describe ways to prevent ransomware
  • Describe antivirus and antimalware tools
  • Describe common signs of a ransomware attack
  • Understand how to respond to a ransomware attack

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved