Microsoft
Microsoft Logo

Examine ransomware and extortion based threats 

  • Offered byMicrosoft

Examine ransomware and extortion based threats
 at 
Microsoft 
Overview

Duration

1 hour

Start from

Start Now

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Details Icon

Examine ransomware and extortion based threats
 at 
Microsoft 
Course details

Skills you will learn
What are the course deliverables?
  • Define ransomware and extortion-based security threats
  • Identify vulnerabilities that ransomware can exploit
  • Prevent ransomware and extortion-based attacks
  • Recover from ransomware attacks
More about this course
  • The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware threats, and finally, how to recover from an attack
  • This course will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know

Examine ransomware and extortion based threats
 at 
Microsoft 
Curriculum

Define ransomware and extortion-based security threats

Introduction

Overview of ransomware

The scale of the ransomware problem

Types of attacks

Ransomware families

Knowledge check

Summary

Identify vulnerabilities that ransomware can exploit

Introduction

Describe the threat landscape

Describe different ransomware entry points

Describe ransomware specialties

Knowledge check

Summary

Prevent ransomware and extortion-based attacks

Introduction

Describe different defense mechanisms used to prevent ransomware

Steps to prevent ransomware

Describe how antivirus and antimalware tools work

Knowledge check

Summary

Recover from ransomware attacks

Introduction

Detect a ransomware attack

Describe how to respond to a ransomware attack

Knowledge check

Summary

Examine ransomware and extortion based threats
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Examine ransomware and extortion based threats
 at 
Microsoft 
Admission Process

    Important Dates

    Nov 30, 2024
    Course Commencement Date

    Other courses offered by Microsoft

    Free
    2 hours
    Intermediate
    Free
    4 hours
    Intermediate
    Free
    5 hours
    Beginner
    Free
    1 hours
    Beginner
    View Other 1171 CoursesRight Arrow Icon
    qna

    Examine ransomware and extortion based threats
     at 
    Microsoft 

    Student Forum

    chatAnything you would want to ask experts?
    Write here...