Description
Audience Profile
This course is intended for both novice and experienced IT professionals. Students typically could have some experience or exposure to other IT-related areas, but have minimal or no exposure to cybersecurity or ransomware. Audience can include, but is not limited to, administrators, developers, testers, analysts, and students.
At Course Completion
After completing this course, students will be able to:
- Understand the cybersecurity landscape
- Describe how encryption works
- Understand the difference between authorization and authentication
- Discuss device-based threats
- Understand networks and network-based threats
- Discuss how applications can be exploited by cybercriminals
- Discuss ransomware, the types of ransomware attacks, and ransomware families
- Describe different ways to prevent ransomware
- Understand common signs of ransomware attacks
- Describe how to recover from ransomware attacks
Prerequisites
- Basic awareness of IT, devices, and applications