(ISC)² Offers Free Ransomware Training

The Professional Development Institute (ISC)2 is offering to a free ransomware course to help organisations defend their critical assets from this increasingly prevalent threat. 
 
The award winning PDI consists of more than 40 expert-instructed cyber security courses that are free to members and associates of (ISC)² and available for purchase by non-members. recognises the intense demand for ransomware prevention and mitigation content and has opened registration to anyone who is interested in the topic.
 
“Ransomware has become one of the hottest topics we’ve seen in years both in cybersecurity practitioner circles, boardrooms, the media and the halls of government. The intense interest has prompted us to extend free access to this course to as many people as possible in an effort to help organisations avoid becoming a victim,” said Mirtha Collin, director of education, (ISC)².   “The course covers the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans that should be in place ahead of time.”   
 
The two-hour ransomware course is Quality Matters  (QM) approved and upon successful completion, learners earn a certification of completion and digital badge.
 
The feedback below highlights some of the aspects of the course that learners have appreciated related to its value:
 
• “I enjoyed that this course laid the foundation through precise learning objectives. It was easy to match the content being presented with the applicable learning objective. Course material was well written and provided up-to-date background information on the topic.”
 
• “One of the things that I really appreciate when it comes to these PDI courses is the currency of the subject matter. As the nation is currently grappling with the huge ransomware case affecting the oil transportation pipeline on our US East Coast, I am very glad to see this ransomware course in your portfolio. It really exemplifies the relevancy and currency of so many of your courses.”
 
• “This course provided a high-level overview of Ransomware and what to expect. It provided some insight into areas I have not thought about up to this point, such as the role of the insurance company.” 

Ransomware: Identify, Protect, Detect, Recover is available for Free Registration now.

(ISC)2:       PR Newswire:      Business Insider:   
 
You Might Also Read: 
 
Negotiating Ransom: To Pay Or Not?:
 
« Social Media’s Effects On Mental Health
Russia Wants A Deal With The US On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

Intercede

Intercede

Intercede is a cybersecurity company specializing in digital identities, derived credentials and access control, enabling digital trust in a mobile world.

Communications Authority of Kenya

Communications Authority of Kenya

The Authority is responsible for facilitating the development of the information and communications sectors including; broadcasting, telecommunications, electronic commerce and cybersecurity.

A3Sec

A3Sec

A3Sec provides professional solutions in the areas of Cybersecurity, Device Monitoring, Business Intelligence and Big Data.

Onward Security

Onward Security

Onward Security provides security solutions including network & application assessment, product security testing and security consulting services.

DreamIt Ventures

DreamIt Ventures

DreamIt Ventures is an early stage venture fund that accelerates startups building transformative tech products in the fields of Healthtech, Securetech, and Urbantech.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Finosec

Finosec

Finosec's mission is to change the way information security and cybersecurity are managed in banking.

SignalSEC

SignalSEC

SignalSEC provides vulnerability intelligence, malware analysis, penetration testing and associated training services.

Xopero Software

Xopero Software

Xopero Software develops a comprehensive range of professional tools for protecting and restoring critical business data.

Cyberguardians

Cyberguardians

Cyberguardians is a team of experienced cybersecurity experts and consultants who always believe in the value and a high level of cybersecurity services to clients.

Womble Bond Dickinson

Womble Bond Dickinson

Womble Bond Dickinson is a transatlantic law firm, providing high-quality legal experience and outstanding personal service from key locations across the United Kingdom and United States.

CatchProbe Intelligence Technologies

CatchProbe Intelligence Technologies

CatchProbe provides actionable web intelligence, OSINT, deception systems, threat intelligence, and digital crime analytics solutions and products through an AI-Driven intelligence platform.

Protecto

Protecto

Make privacy and governance effortless. Brakes allow you to drive faster. Stronger data privacy and security enable companies to unlock the full potential of the data.

Jericho Security

Jericho Security

Jericho Security is on a mission to defend the world from the new threats of generative AI cyber attacks.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.