In this course, you’ll learn the common methods which make ransomware attacks successful.
Overview
COURSE INSTRUCTOR
COURSE DIFFICULTY
Skills Learned
After completing this online training course, students will be able to:
Describe how we may become a victim of ransomware
All computer users
None
01. Ransomware Distribution Methods
02. How an Email Attachment Can Lead to Ransomware
03. How Unsafe Browsing Can Lead to Ransomware
04. How USB Drives Can Lead to Ransomware
05. How Office Macros Can Lead to Ransomware
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
Describe how we may become a victim of ransomware
WHO SHOULD ATTEND
All computer users
PREREQUISITES
None
COURSE OUTLINE
01. Ransomware Distribution Methods
02. How an Email Attachment Can Lead to Ransomware
03. How Unsafe Browsing Can Lead to Ransomware
04. How USB Drives Can Lead to Ransomware
05. How Office Macros Can Lead to Ransomware
SCHEDULE