Examine ransomware and extortion based threats
- Offered byMicrosoft
Examine ransomware and extortion based threats at Microsoft Overview
Duration | 1 hour |
Start from | Start Now |
Total fee | Free |
Mode of learning | Online |
Schedule type | Self paced |
Difficulty level | Beginner |
Official Website | Explore Free Course |
Credential | Certificate |
Examine ransomware and extortion based threats at Microsoft Course details
- Define ransomware and extortion-based security threats
- Identify vulnerabilities that ransomware can exploit
- Prevent ransomware and extortion-based attacks
- Recover from ransomware attacks
- The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware threats, and finally, how to recover from an attack
- This course will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know
Examine ransomware and extortion based threats at Microsoft Curriculum
Define ransomware and extortion-based security threats
Introduction
Overview of ransomware
The scale of the ransomware problem
Types of attacks
Ransomware families
Knowledge check
Summary
Identify vulnerabilities that ransomware can exploit
Introduction
Describe the threat landscape
Describe different ransomware entry points
Describe ransomware specialties
Knowledge check
Summary
Prevent ransomware and extortion-based attacks
Introduction
Describe different defense mechanisms used to prevent ransomware
Steps to prevent ransomware
Describe how antivirus and antimalware tools work
Knowledge check
Summary
Recover from ransomware attacks
Introduction
Detect a ransomware attack
Describe how to respond to a ransomware attack
Knowledge check
Summary