(ISC)² Offers Free Ransomware Training

The Professional Development Institute (ISC)2 is offering to a free ransomware course to help organisations defend their critical assets from this increasingly prevalent threat. 
 
The award winning PDI consists of more than 40 expert-instructed cyber security courses that are free to members and associates of (ISC)² and available for purchase by non-members. recognises the intense demand for ransomware prevention and mitigation content and has opened registration to anyone who is interested in the topic.
 
“Ransomware has become one of the hottest topics we’ve seen in years both in cybersecurity practitioner circles, boardrooms, the media and the halls of government. The intense interest has prompted us to extend free access to this course to as many people as possible in an effort to help organisations avoid becoming a victim,” said Mirtha Collin, director of education, (ISC)².   “The course covers the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans that should be in place ahead of time.”   
 
The two-hour ransomware course is Quality Matters  (QM) approved and upon successful completion, learners earn a certification of completion and digital badge.
 
The feedback below highlights some of the aspects of the course that learners have appreciated related to its value:
 
• “I enjoyed that this course laid the foundation through precise learning objectives. It was easy to match the content being presented with the applicable learning objective. Course material was well written and provided up-to-date background information on the topic.”
 
• “One of the things that I really appreciate when it comes to these PDI courses is the currency of the subject matter. As the nation is currently grappling with the huge ransomware case affecting the oil transportation pipeline on our US East Coast, I am very glad to see this ransomware course in your portfolio. It really exemplifies the relevancy and currency of so many of your courses.”
 
• “This course provided a high-level overview of Ransomware and what to expect. It provided some insight into areas I have not thought about up to this point, such as the role of the insurance company.” 

Ransomware: Identify, Protect, Detect, Recover is available for Free Registration now.

(ISC)2:       PR Newswire:      Business Insider:   
 
You Might Also Read: 
 
Negotiating Ransom: To Pay Or Not?:
 
« Social Media’s Effects On Mental Health
Russia Wants A Deal With The US On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Virtual Security

Virtual Security

Virtual Security provides solutions in the field of managed security services, network security, secure remote work, responsible internet, application security, encryption, BYOD and compliance.

Nixu

Nixu

Nixu is the largest Nordic specialist company in information security consulting.

Quest Software

Quest Software

Simple IT management for a complex world. Whether it’s digital transformation, cloud expansion, security threats or something new, Quest helps you solve complex problems with simple solutions.

Industrial Internet Consortium (IIC)

Industrial Internet Consortium (IIC)

The Industrial Internet Consortium is the world's leading organization transforming business and society by accelerating the Industrial Internet of Things (IIoT).

DataDome

DataDome

DataDome offers real-time AI protection against all OWASP automated threats, including credential stuffing, layer 7 DDoS attacks, SQL injection & intensive scraping.

Sylint

Sylint

Sylint is an internationally recognized cyber security and digital data forensics firm with extensive experience discretely addressing some of today’s biggest cyber breaches.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.