PDP Url

How to Protect your Organization from Ransomware

A new type of ransomware called WannaCry, also called WannaCrypt0r, WeCry, or WannaCrypt. This ransomware computer worm is still ongoing and targeting the Microsoft Windows operating system. It encrypts data and demands ransom payment from victims. Only the attackers possess the private key for decrypting your files. From the initially attacked system it rapidly spreads to random computers on the internet and the network by exploiting vulnerabilities in the Windows Server Message Block (SMB) file sharing protocol.

Self-Paced

Learning Style

Beginner

Difficulty

40 Min

Course Duration

Course Info

Download PDF

Certificate

See Sample

About Individual Course:
  • Individual course plan gives you access to this course
$0.00
$0.00
/ Each
When you subscribe, you get:
Learn Subscription plan gives you access to this course and over 820 other popular courses
On Sale!
Now Only $39.99 Regular Price $44.99
Now Only $39.99 Regular Price $44.99
/ Month
Team
Pricing
  • Buy 5-9 Enrollments And Save 68% ($12.74 monthly.)
  • Buy 10-19 Enrollments And Save 72% ($11.24 monthly.)
  • Buy 20-above Enrollments And Save 78% ($8.99 monthly.)
A new type of ransomware called WannaCry, also called WannaCrypt0r, WeCry, or WannaCrypt. This ransomware computer worm is still ongoing and targeting the Microsoft Windows operating system. It encrypts data and demands ransom payment from victims. Only the attackers possess the private key for decrypting your files. From the initially attacked system it rapidly spreads to random computers on the internet and the network by exploiting vulnerabilities in the Windows Server Message Block (SMB) file sharing protocol.

Course Information

About this course:

More than 230,000 computers in over 150 countries were hit by the recent cyberattack using a new type of ransomware called WannaCry, also called WannaCrypt0r, WeCry, or WannaCrypt. This ransomware computer worm is still ongoing and targeting the Microsoft Windows operating system. It encrypts data and demands ransom payment from victims. Only the attackers possess the private key for decrypting your files. From the initially attacked system it rapidly spreads to random computers on the internet and the network by exploiting vulnerabilities in the Windows Server Message Block (SMB) file sharing protocol.

Audience:

  • Cybersecurity officer
  • IT officer

Prerequisite:

  • There are no prerequisites required for this course

Outline

More Information

More Information
Subjects Information Security
Lab Access No
Learning Style Self-Paced Learning
Difficulty Beginner
Course Duration 40 Min
Language English

Reviews

Write Your Own Review
Only registered users can write reviews. Please Sign in or create an account

Contact A Learning Consultant


click here