Ransomware: Empowering Managers and Non-Techies to protect their precious data!

Overview
1) Understand which controls to implement
2) Explain the effectiveness of the control
3) Understand how to balance a portfolio of control

Benefits

Best Practices

Follow a structured, detailed approach to learn the best practices complete with practical examples and a quiz to test your knowledge!

Fast Learning!

Years worth of experience condensed into short videos. Within 1,5 hour you understand how to protect web application and are able to spar with developers!

Exclusive Webinar

Access to an exclusive webinar where you can ask your most pressing questions directly to the creator of the course!

Test your ransomware knowledge here!

If you don’t know the answers to one or more of these questions, your (web) application may be at risk.
You have borrowed data from your customers, you did not inherited it. Handle it with care.

Here's What's Inside The Course:

LESSON #1:

What is ransomware?

LESSON #2:

What is the impact of ransomware?

LESSON #3:

How difficult is it to deploy ransomware?

LESSON #4:

Management summary of the course

LESSON #5:

Education and awareness training

LESSON #6:

Identify and classify data

LESSON #7:

Develop and enforce security policy

LESSON #8:

Harden operating systems, networks and applications

LESSON #9:

Detect and block malicious emails and attachments

LESSON #10:

Scan, record and assess logs

LESSON #11:

Test controls (also for third parties)

LESSON #12:

Rotate, Repave and Repair

LESSON #13:

Unplug, scan and decrypt

LESSON #14:

Business continuity

LESSON #15:

Disaster recovery and training

LESSON #16:

Test recovery procedure regularly

About Security Repo

Security Repo was founded by Soerin Bipat, a (chief) information security officer, teacher and researcher. His passion is to develop an information security and privacy strategy along with the customer to achieve their goals. He has been active in several layers of the IT and business domain for almost 15 years.

Our mission at Security Repo is to provide security education to anyone who needs to protect data. We specialise in creating content that shares best practices based on scientific research and requires limited prerequisite knowledge.

Whether you’re new to information security or want to refresh your memory on something you’ve learned in the past, Security Repo has you covered.

Testimonials

Watch a Sneak Preview

Watch videos that are part of this course for free! The full course contains all the a lessons described above. Enrol and understand how to prevent and limit the impact of a ransomware attack within 1,5 hours!

FAQ

I have a 30-day 100% money back guarantee, so if you aren’t happy with your purchase, I will refund your course – no questions asked! However, students love this course and I’m pretty sure you will too.

Within 1 hour you will understand the most important controls you need to implement to prevent and limit the impact of a Ransomware attack.

Course Outline – This course covers 4 phases with several controls per phase:

1. Identify and Prevent

  • Education and awareness

  • Identify and classify data

  • Develop and enforce policies

  • Harden OS, networks, apps, etc.

2. Detection

  • Detect and block emails/attachments

  • Scan, record and assess logs

  • Test control (also for third parties)

3. Response

  • Repair, Repave & Rotate

  • Unplug, scan and decrypt

  • Business continuity

4. Recovery

  • Disaster recovery

  • Test recovery procedures regularly

This course will jumpstart your security career!  

Whether you’re new web application security or or want to refresh your memory, this course has short videos that are easy to understand and require not prerequisite knowledge!

– Management: Learn high level cybersecurity measures within 60 minutes
– IT-manager: Learn security best practices based on proven model
– Business managers: non-technical employees through basic security measures
– Everyone else: best practices on protecting your organisation against ransomware

Herewith some of the learning objectives you can expect after following this course:

– Be confident in explaining how to prevent and limit the impact of ransomware during an interview
– You will be able to methodically explain the controls to get attention of managers
– You will have an overview and plan to protect your business against the threat ransomware
– Know how to balance controls effectively.
– Understand how ransomware can be deployed

So, after following this course you’ll understand essential controls and know how to explain them.
“If you want to make a promotion, your effectiveness depends on your ability to reach others through the spoken and written word” (P. Drucker).

True, let me explain by giving you an overview of my experience:
– Parttime PhD researcher. I read the science, you’ll get the knowledge! What more do you want? 
– (Chief) Information Security Officer.  Responsible for implementing and maintaining a well balanced organisational risk posture;
– Software consultant (6,5 years). I’ve advised many managers of large / small IT projects on various software related aspects. 
– Unlike most other courses, you may actually claim 1 Continuing Professional Education (CPE) after finishing this course completely

Besides that I hold several certifications:
– CISSP which stands for Certified Information Systems Security Professional
– CSSLP which stands for Certified Secure Software Lifecycle Professional
– CISA stands for Certified Information Systems Auditor
– CIPP/E stands for Certified Information Privacy Professional / Europe
– ISO 27001 Lead Implementor
– ISO 27001 Lead Auditor
– Togaf foundation
– Archimate foundation

All four certifications are vendor-neutral certification programs. 

The course is made available online and you can log on to it and watch the videos, just like any other service. 

This courses is created such that everybody can follow it. Prerequisites are:
– Pen and paper to take notes
– Willingness to play with presented content

The controls are explained conceptually, since the implementation may differ per situation. Therefore, having a general understanding of the security controls will provide you with the essential knowledge to mitigate the impact of ransomware. Hence, no coding or technical experience is needed.

While online learning may not be for everyone, this course comes with an exclusive webinar for you to ask your most pressing questions or just to follow Q&A asked by the community!

Sure! Scroll up and you will find a sneak preview video on this page. Watch these videos for free. Like me teaching style, do not hesitate to enrol and take control of your first impressions!

NOW, YOU'RE PROBABLY WONDERING...

"How much would it cost
me to join?

Well, if you’re going to add all the lessons and bonuses…

  • 16 Easy-to-Understand Lessons About Ransomware
  • BONUS #1: !! EXCLUSIVE ACCESS TO TEACHER THROUGH A WEBINAR !!
  • BONUS #2: Lots of downloadable documents for further reading
  • BONUS #3: 1 Continuing Professional Education (CPE) Credit

… you’ll have to pay at least $350.

And considering it costed me thousands of dollars in formal education…

… and several years of practice and experience…

$350 is very reasonable

But I’m not going to charge you that amount for this course because it’s my mission to help as many people as I can to reduce web application security exploits.

I won’t even charge you $200…

Not even $100…

Because today...

You'll Get Everything For Only...

... a one-time fee of $350
$12.99!

P.S. Price may change at anytime without prior notice.