Course curriculum

  • 1

    Introduction

    • Lecture 1: What is ransomware?

    • Lecture 2: What is the impact of ransomware?

    • Lecture 3: How difficult is it to deploy a ransomware attack?

    • Lecture 4: Management summary of the course!

  • 2

    Phase: Identification and prevention

    • Lecture 5: Education and awareness training

    • Quiz 1 : What is the primary importance of awareness training in cybersecurity?

    • Lecture 6: Identify and classify data

    • Quiz 2 : What is the primary importance of awareness training in cybersecurity?

    • Lecture 7: Develop and enforce security policy

    • Quiz 3: What is the primary importance of a security policy in an organization?

    • Lecture 8: Harden operating systems, networks, applications, etc.

    • Quiz 4 : Which of the following best describes the primary purpose of hardening operating

  • 3

    Phase: Detection

    • Lecture 9: Detect & block fraudulent email and attachments

    • Quiz 5 : What is the primary purpose of detecting and blocking fraudulent email attachmen

    • Lecture 10: Scan, record and assess logs

    • Quiz 6: In the context of cybersecurity, what is the primary objective of assessing logs?

    • Lecture 11: Test controls (also third party)

    • Quiz 7: SOC 2 (Service Organization Control 2)

  • 4

    Phase: Response

    • Lecture 12: Rotate, Repave and Repair

    • Quiz 8 : What is the primary purpose of key rotation in cryptography and data security?

    • Quiz 9 : What is the primary significance of software patching in cybersecurity?

    • Lecture 13: Unplug, scan and decrypt

    • Quiz 10: Unplugging servers

    • Lecture 14: Business continuity

    • Quiz 11: Business continuity planning

  • 5

    Phase: Recover

    • Lecture 15: Disaster recovery planning and training

    • Quiz 12: Disaster recovery and business continuity testing

    • Lecture 16: Test recovery procedures regularly

    • Quiz 13: Backup strategies