This course focuses on cyberattacks, specifically compromises via ransomware. Implementing strategies to defend against attacks as well as preparations for response and recovery in the event of an incident is critical to an organization’s resilience. This course reviews malware types and vectors for compromise, common issues hindering an effective response, best practices for preparing and responding to an infection incident, and defensive measures to strengthen the cybersecurity posture.
- Identify the various types of disruptionware, vectors for compromise, and the impact of an infection on business operations.
- Recognize the common problems that can hinder effective incident response and prevention activities.
- Know the ordered steps in following documented incident reporting procedures including immediate actions and communication.
- Explain the importance of defense-in-depth layered strategy for protecting the enterprise with examples of implementation.