Microsoft
Microsoft Logo

Examine ransomware and extortion based threats 

  • Offered byMicrosoft

Examine ransomware and extortion based threats
 at 
Microsoft 
Overview

Duration

1 hour

Total fee

Free

Mode of learning

Online

Schedule type

Self paced

Difficulty level

Beginner

Official Website

Explore Free Course External Link Icon

Credential

Certificate

Examine ransomware and extortion based threats
Table of content
Accordion Icon V3
  • Overview
  • Course Details
  • Curriculum
  • Entry Requirements
Details Icon

Examine ransomware and extortion based threats
 at 
Microsoft 
Course details

Skills you will learn
What are the course deliverables?
  • Define ransomware and extortion-based security threats
  • Identify vulnerabilities that ransomware can exploit
  • Prevent ransomware and extortion-based attacks
  • Recover from ransomware attacks
More about this course
  • The modules in this learning path will provide you with insights and information to help you better understand this threat, including a broad look at ransomware and extortion-based threats, how cybercriminals exploit security weaknesses to gain access to your computers and devices, some of the steps you can take prevent ransomware threats, and finally, how to recover from an attack
  • This course will define ransomware, determine the scope of the ransomware problem, describe who ransomware victims are, and will touch on a few notable ransomware "families" that everyone should know

Examine ransomware and extortion based threats
 at 
Microsoft 
Curriculum

Define ransomware and extortion-based security threats

Introduction

Overview of ransomware

The scale of the ransomware problem

Types of attacks

Ransomware families

Knowledge check

Summary

Identify vulnerabilities that ransomware can exploit

Introduction

Describe the threat landscape

Describe different ransomware entry points

Describe ransomware specialties

Knowledge check

Summary

Prevent ransomware and extortion-based attacks

Introduction

Describe different defense mechanisms used to prevent ransomware

Steps to prevent ransomware

Describe how antivirus and antimalware tools work

Knowledge check

Summary

Recover from ransomware attacks

Introduction

Detect a ransomware attack

Describe how to respond to a ransomware attack

Knowledge check

Summary

Examine ransomware and extortion based threats
 at 
Microsoft 
Entry Requirements

Eligibility criteriaUp Arrow Icon
Conditional OfferUp Arrow Icon
  • Not mentioned

Other courses offered by Microsoft

Free
1 hours
Beginner
Free
3 hours
Intermediate
Free
14 hours
Beginner
Free
2 hours
Intermediate
View Other 1171 CoursesRight Arrow Icon
qna

Examine ransomware and extortion based threats
 at 
Microsoft 

Student Forum

chatAnything you would want to ask experts?
Write here...