(ISC)² Offers Free Ransomware Training

The Professional Development Institute (ISC)2 is offering to a free ransomware course to help organisations defend their critical assets from this increasingly prevalent threat. 
 
The award winning PDI consists of more than 40 expert-instructed cyber security courses that are free to members and associates of (ISC)² and available for purchase by non-members. recognises the intense demand for ransomware prevention and mitigation content and has opened registration to anyone who is interested in the topic.
 
“Ransomware has become one of the hottest topics we’ve seen in years both in cybersecurity practitioner circles, boardrooms, the media and the halls of government. The intense interest has prompted us to extend free access to this course to as many people as possible in an effort to help organisations avoid becoming a victim,” said Mirtha Collin, director of education, (ISC)².   “The course covers the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans that should be in place ahead of time.”   
 
The two-hour ransomware course is Quality Matters  (QM) approved and upon successful completion, learners earn a certification of completion and digital badge.
 
The feedback below highlights some of the aspects of the course that learners have appreciated related to its value:
 
• “I enjoyed that this course laid the foundation through precise learning objectives. It was easy to match the content being presented with the applicable learning objective. Course material was well written and provided up-to-date background information on the topic.”
 
• “One of the things that I really appreciate when it comes to these PDI courses is the currency of the subject matter. As the nation is currently grappling with the huge ransomware case affecting the oil transportation pipeline on our US East Coast, I am very glad to see this ransomware course in your portfolio. It really exemplifies the relevancy and currency of so many of your courses.”
 
• “This course provided a high-level overview of Ransomware and what to expect. It provided some insight into areas I have not thought about up to this point, such as the role of the insurance company.” 

Ransomware: Identify, Protect, Detect, Recover is available for Free Registration now.

(ISC)2:       PR Newswire:      Business Insider:   
 
You Might Also Read: 
 
Negotiating Ransom: To Pay Or Not?:
 
« Social Media’s Effects On Mental Health
Russia Wants A Deal With The US On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

TitanFile

TitanFile

TitanFile is an award-winning, easy and secure way for professionals to communicate without having to worry about security and privacy.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

CERT.AZ

CERT.AZ

The national Cyber Security Center of the Republic of Azerbaijan.

Qualitèsoft Technology

Qualitèsoft Technology

Qualitèsoft Technology is a leading Software Development and Quality Assurance organization. We specialize in Custom Development, Mobile Application, Software Testing and Quality Assurance.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

Sergeant Laboratories

Sergeant Laboratories

Sergeant Laboratories builds advanced technologies to prove compliance in complex IT security and regulatory compliance situations.

Deepnet Security

Deepnet Security

Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM).

Polaris Infosec

Polaris Infosec

Polaris Web Presence Protection (WPP) is powered by our proprietary artificial intelligence and machine learning engine to ensure that attacks are stopped before they affect your business.

Telefonica Global Solutions (TGS)

Telefonica Global Solutions (TGS)

Telefonica Global Solutions is the technological partner of wholesalers and enterprises, helping them to achieve the digitalization they need.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

OneLayer

OneLayer

OneLayer provide enterprise grade security dedicated for private LTE/5G networks. We ensure that the best IoT security toolkit is implemented in your cellular environment.

SK Shieldus

SK Shieldus

SK shieldus are a converged security provider with business capabilities in both cybersecurity and physical security based on Big-Tech.

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Exiger

Exiger

Exiger is revolutionizing the way corporations, government agencies and banks navigate risk and compliance in their third-parties, supply chains and customers.