Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Microsoft

Examine ransomware and extortion-based threats

Microsoft via Microsoft Learn

Overview

  • Module 1: Ransomware attacks are growing at an alarming rate. But what exactly is a ransomware attack? This module will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know.

    By the end of this module, you'll be able to:

    • Define ransomware.
    • Identify different attack types.
    • Explain what a ransomware family is.
    • Describe a real-life ransomware attack.
  • Module 2: How will you know if you are a victim of ransomware? This module will cover the top ransomware families for today's threat landscape and the vectors they use to enter and infect your organization's files and systems.

    By the end of this module, you'll be able to:

    • Describe the nature of the threat landscape and an attack vector
    • Describe different entry points and how they are used to breach your security
    • Describe the specialization of ransomware
  • Module 3: Prevention against ransomware is essential because such an attack can lead to major disruption for you or your business. In this module, you'll learn about best practices to protect yourself against ransomware and other extortion-based attacks.

    By the end of this module, you'll be able to:

    • Describe different defense mechanisms used to prevent ransomware.
    • List the steps to prevent ransomware.
    • Describe how antivirus/antimalware tools work.
  • Module 4: Any organization or individual runs the risk of a ransomware attack. As such, the ability to promptly spot and respond to an attack remains essential for successful recovery. In this module, you'll learn how to detect, and recover from a ransomware attack.

    By the end of this module, you'll be able to:

    • Describe the different indicators of a ransomware attack.
    • Describe the different measures used to identify an attack.
    • Describe how to investigate a ransomware attack.
    • Describe how to recover from a ransomware attack.

Syllabus

  • Module 1: Module 1: Define ransomware and extortion-based security threats
    • Introduction
    • Overview of ransomware
    • The scale of the ransomware problem
    • Types of attacks
    • Ransomware families
    • Knowledge check
    • Summary
  • Module 2: Module 2: Identify vulnerabilities that ransomware can exploit
    • Introduction
    • Describe the threat landscape
    • Describe different ransomware entry points
    • Describe ransomware specialties
    • Knowledge check
    • Summary
  • Module 3: Module 3: Prevent ransomware and extortion-based attacks
    • Introduction
    • Describe different defense mechanisms used to prevent ransomware
    • Steps to prevent ransomware
    • Describe how antivirus and antimalware tools work
    • Knowledge check
    • Summary
  • Module 4: Module 4: Recover from ransomware attacks
    • Introduction
    • Detect a ransomware attack
    • Describe how to respond to a ransomware attack
    • Knowledge check
    • Summary

Reviews

Start your review of Examine ransomware and extortion-based threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.