(ISC)² Offers Free Ransomware Training

The Professional Development Institute (ISC)2 is offering to a free ransomware course to help organisations defend their critical assets from this increasingly prevalent threat. 
 
The award winning PDI consists of more than 40 expert-instructed cyber security courses that are free to members and associates of (ISC)² and available for purchase by non-members. recognises the intense demand for ransomware prevention and mitigation content and has opened registration to anyone who is interested in the topic.
 
“Ransomware has become one of the hottest topics we’ve seen in years both in cybersecurity practitioner circles, boardrooms, the media and the halls of government. The intense interest has prompted us to extend free access to this course to as many people as possible in an effort to help organisations avoid becoming a victim,” said Mirtha Collin, director of education, (ISC)².   “The course covers the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans that should be in place ahead of time.”   
 
The two-hour ransomware course is Quality Matters  (QM) approved and upon successful completion, learners earn a certification of completion and digital badge.
 
The feedback below highlights some of the aspects of the course that learners have appreciated related to its value:
 
• “I enjoyed that this course laid the foundation through precise learning objectives. It was easy to match the content being presented with the applicable learning objective. Course material was well written and provided up-to-date background information on the topic.”
 
• “One of the things that I really appreciate when it comes to these PDI courses is the currency of the subject matter. As the nation is currently grappling with the huge ransomware case affecting the oil transportation pipeline on our US East Coast, I am very glad to see this ransomware course in your portfolio. It really exemplifies the relevancy and currency of so many of your courses.”
 
• “This course provided a high-level overview of Ransomware and what to expect. It provided some insight into areas I have not thought about up to this point, such as the role of the insurance company.” 

Ransomware: Identify, Protect, Detect, Recover is available for Free Registration now.

(ISC)2:       PR Newswire:      Business Insider:   
 
You Might Also Read: 
 
Negotiating Ransom: To Pay Or Not?:
 
« Social Media’s Effects On Mental Health
Russia Wants A Deal With The US On Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Open Networking Foundation (ONF)

Open Networking Foundation (ONF)

The Open Networking Foundation (ONF) is a non-profit operator led consortium driving transformation of network infrastructure and carrier business models.

Firebrand

Firebrand

Firebrand is the leader in Accelerated Learning in the field of IT and project management.

ABB

ABB

ABB is a pioneering technology leader in industrial digitalization. Services include cyber security for industrial control systems IoT.

Magal Security Systems (Magal S3)

Magal Security Systems (Magal S3)

Magal Security Systems is a leading international provider of integrated solutions and products for physical and cyber security, safety and site management.

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions (ACS)

Automation & Cyber Solutions delivers a range of Industrial Automation and Cyber solutions & services to sectors including Oil & Gas, Chemicals & Petrochemicals, Power and others.

NLnet Labs

NLnet Labs

NLnet Labs is a not-for-profit foundation with a long heritage in research and development, Internet architecture and governance, as well as security in the area of DNS and inter-domain routing.

ThirdWatch

ThirdWatch

ThirdWatch is a Data Science company with real-time automated fraud prevention solutions.

VXRL

VXRL

VXRL is a Hong Kong-based cybersecurity company. We provide consulting services, penetration testing, and corporate training.

Dutch Accreditation Council (RvA)

Dutch Accreditation Council (RvA)

RvA is the national accreditation body for the Netherlands. The directory of members provides details of organisations offering certification services for ISO 27001.

Blueskytec (BST)

Blueskytec (BST)

Blueskytec has applied its experience of over three decades of working in the field of embedded systems and encryption to provide a scalable and appropriate technology for cyber-physical devices.

AdaCore

AdaCore

AdaCore is focused on helping developers build safe, secure and reliable software.

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

Debevoise & Plimpton

Debevoise & Plimpton

Debevoise & Plimpton LLP is a premier law firm with market-leading practices in areas including Data Strategy & Security.

Kiteworks

Kiteworks

Kiteworks (formerly Accellion) creates a dedicated Private Content Network that ensures zero-trust private content protection and compliance.

Evo Security

Evo Security

Evo Security is an Identity and Access Management company focused exclusively on serving MSPs, MSSPs and their SMB and Mid-Market customers.

Aspiron Search

Aspiron Search

Aspiron Search is a niche-focused Cybersecurity search firm that works exclusively with venture-backed Cybersecurity firms.