Cybersecurity and Ransomware Fundamentals Courseware Training in Rocky Mount

Enroll in or hire us to teach our Cybersecurity and Ransomware Fundamentals Courseware class in Rocky Mount, North Carolina by calling us @303.377.6176. Like all HSG classes, Cybersecurity and Ransomware Fundamentals Courseware may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, Cybersecurity and Ransomware Fundamentals Courseware may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
This one-day course is designed to provide IT professionals with a fundamental understanding of cybersecurity, with a particular focus on ransomware. The course covers topics such as cybersecurity threats, encryption, authentication, authorization, and ransomware attacks, along with strategies for ransomware protection.
 
The course is suitable for both novice and experienced IT professionals. It's designed for individuals who may have experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. This includes administrators, developers, testers, analysts, and students.
Course Length: 1 Days
Course Tuition: $490 (US)

Prerequisites

Basic awareness of IT, devices, and applications.

Course Outline

 
Module 1: Fundamentals of Cybersecurity
This module explains the fundamentals of cybersecurity. It will give the student an awareness of the cybersecurity landscape, how encryption, authentication and authorization work, and draws attention to different attack vectors that cybercriminals can exploit to carry out attacks and gain unauthorized access.
 
Lessons
An overview of cybersecurity
Basic introduction to encryption
How to verify your users and control their access
Network threats
Devices as threat vectors
Application vulnerabilities
Lab 1: Fundamentals of Cybersecurity
 
Paper-based exercise, break out session with scenario and discussion with the group on the outcome.
After completing this module, students will be able to:
Describe the cybersecurity landscape.
Discuss how encryption works.
Describe the differences between authentication and authorisation.
Describe different network types, the network threat landscape and how to protect them from cyberattack.
Describe what a device is, how much a device knows about you, and device-based threats.
Discuss how applications can be exploited to gain access
Module 2: The Basics of Ransomware
This module explains the basics of ransomware. Students will get a basic introduction to ransomware, how to protect against ransomware, and what can be done to effectively recover from a ransomware attack.
 
Lessons
Introduction to ransomware
How to protect against ransomware attacks
How to recover from a ramsomware attack
Lab 1: The Basics of Ransomware
 
Paper-based exercise, break out session with scenario and discussion with the group on the outcome
After completing this module, students will be able to:
Understand ransomware
Describe different types of ransomware attacks
Discuss the ransomware families
Discuss how ransomware has become a business
Understand defense mechanisms against ransomware attacks
Describe ways to prevent ransomware
Describe antivirus and antimalware tools
Describe common signs of a ransomware attack
Understand how to respond to a ransomware attack

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.