(ISC)² Offers Free Ransomware Training

The Professional Development Institute (ISC)2 is offering to a free ransomware course to help organisations defend their critical assets from this increasingly prevalent threat. 
 
The award winning PDI consists of more than 40 expert-instructed cyber security courses that are free to members and associates of (ISC)² and available for purchase by non-members. recognises the intense demand for ransomware prevention and mitigation content and has opened registration to anyone who is interested in the topic.
 
“Ransomware has become one of the hottest topics we’ve seen in years both in cybersecurity practitioner circles, boardrooms, the media and the halls of government. The intense interest has prompted us to extend free access to this course to as many people as possible in an effort to help organisations avoid becoming a victim,” said Mirtha Collin, director of education, (ISC)².   “The course covers the major distinctions between ransomware and malware, the key characteristics of ransomware attacks, and the protection strategies and remediation plans that should be in place ahead of time.”   
 
The two-hour ransomware course is Quality Matters  (QM) approved and upon successful completion, learners earn a certification of completion and digital badge.
 
The feedback below highlights some of the aspects of the course that learners have appreciated related to its value:
 
• “I enjoyed that this course laid the foundation through precise learning objectives. It was easy to match the content being presented with the applicable learning objective. Course material was well written and provided up-to-date background information on the topic.”
 
• “One of the things that I really appreciate when it comes to these PDI courses is the currency of the subject matter. As the nation is currently grappling with the huge ransomware case affecting the oil transportation pipeline on our US East Coast, I am very glad to see this ransomware course in your portfolio. It really exemplifies the relevancy and currency of so many of your courses.”
 
• “This course provided a high-level overview of Ransomware and what to expect. It provided some insight into areas I have not thought about up to this point, such as the role of the insurance company.” 

Ransomware: Identify, Protect, Detect, Recover is available for Free Registration now.

(ISC)2:       PR Newswire:      Business Insider:   
 
You Might Also Read: 
 
Negotiating Ransom: To Pay Or Not?:
 
« Social Media’s Effects On Mental Health
Russia Wants A Deal With The US On Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Prolinx

Prolinx

Prolinx provide secure Data Centre hosting services and other fully managed security services for networks and information systems.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

K2 Integrity

K2 Integrity

K2 Integrity is a preeminent risk, compliance, investigations, and monitoring firm - built by industry leaders to safeguard our clients’ operations, reputations, and economic security.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Cyber Security Education

Cyber Security Education

CybersecurityEducation.org is an online directory of cyber security education and careers.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

CyberSwarm

CyberSwarm

CyberSwarm is developing a neuromorphic System-on-a-Chip dedicated to cybersecurity which helps organizations secure communication between connected devices and protect critical business assets.

Beyond Identity

Beyond Identity

Beyond Identity employs an elegantly simple concept, the personal certificate authority and self signed certificates, to replace passwords.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

Red Access

Red Access

Red Access provides the first SaaS-based platform to protect web browsing from cyber threats on any browser and any in-app while ensuring frictionless user experience.

Vaultree

Vaultree

We believe in an encrypted tomorrow. Vaultree technology enables a foundational change in how we communicate with each other: Safely!

MiC Talent Solutions

MiC Talent Solutions

MiC Talent Solutions provides recruiting, direct hire, augmented staff, and professional service contracting solutions for organizations searching for minority cybersecurity talent.

SquareX

SquareX

Squarex secures your online activities without compromising productivity.