Course Outline
Understanding the Ransomware Ecosystem
- Evolution and trends of ransomware
- Common attack vectors and tactics, techniques, and procedures (TTPs)
- Identifying ransomware groups and their affiliates
Ransomware Incident Lifecycle
- Initial compromise and lateral movement within the network
- Data exfiltration and encryption phases of an attack
- Post-attack communication patterns with threat actors
Negotiation Principles and Frameworks
- Foundations of cyber crisis negotiation strategies
- Understanding the motives and leverage of adversaries
- Communication strategies for containment and resolution
Practical Ransomware Negotiation Exercises
- Simulated negotiations with threat actors to practice real-world scenarios
- Managing escalation and time pressure during negotiations
- Documenting negotiation outcomes for future reference and analysis
Threat Intelligence for Ransomware Defense
- Collecting and correlating ransomware indicators of compromise (IOCs)
- Using threat intelligence platforms to enrich investigations and improve defenses
- Tracking ransomware groups and their ongoing campaigns
Decision-Making Under Pressure
- Business continuity planning and legal considerations during an attack
- Working with leadership, internal teams, and external partners to manage the incident
- Evaluating payment versus recovery pathways for data restoration
Post-Incident Improvement
- Conducting lessons learned sessions and reporting on the incident
- Improving detection and monitoring capabilities to prevent future attacks
- Hardening systems against known and emerging ransomware threats
Advanced Intelligence & Strategic Readiness
- Building long-term threat profiles for ransomware groups
- Integrating external intelligence feeds into your defense strategy
- Implementing proactive measures and predictive analysis to stay ahead of threats
Summary and Next Steps
Requirements
- An understanding of cybersecurity fundamentals
- Experience with incident response or Security Operations Center (SOC) operations
- Familiarity with threat intelligence concepts and tools
Audience:
- Cybersecurity professionals involved in incident response
- Threat intelligence analysts
- Security teams preparing for ransomware events
Custom Corporate Training
Training solutions designed exclusively for businesses.
- Customized Content: We adapt the syllabus and practical exercises to the real goals and needs of your project.
- Flexible Schedule: Dates and times adapted to your team's agenda.
- Format: Online (live), In-company (at your offices), or Hybrid.
Price per private group, online live training, starting from 3200 € + VAT*
Contact us for an exact quote and to hear our latest promotions
Testimonials (2)
Clarity and pace of explanations
Federica Galeazzi - Aethra Telecomunications SRL
Course - AI-Powered Cybersecurity: Advanced Threat Detection & Response
It did give me the insight what I needed :) I am starting teaching on a BTEC Level 3 qualification and wanted to widen my knowledge in this area.