Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Understanding the Ransomware Ecosystem
- Ransomware evolution and trends
- Common attack vectors and TTPs
- Identifying ransomware groups and affiliates
Ransomware Incident Lifecycle
- Initial compromise and lateral movement
- Data exfiltration and encryption phases
- Post-attack communication patterns
Negotiation Principles and Frameworks
- Foundations of cyber crisis negotiation
- Understanding adversary motives and leverage
- Communication strategies for containment
Practical Ransomware Negotiation Exercises
- Simulated negotiations with threat actors
- Managing escalation and time pressure
- Documenting negotiation outcomes
Threat Intelligence for Ransomware Defense
- Collecting and correlating ransomware indicators
- Using TI platforms to enrich investigations
- Tracking ransomware groups and campaigns
Decision-Making Under Pressure
- Business continuity and legal considerations
- Working with leadership and external partners
- Evaluating payment vs recovery pathways
Post-Incident Improvement
- Lessons learned and reporting
- Improving detection and monitoring
- Hardening systems against future attacks
Advanced Intelligence & Strategic Readiness
- Building long-term ransomware threat profiles
- Integrating external intelligence feeds
- Proactive measures and predictive analysis
Summary and Next Steps
Requirements
- An understanding of cybersecurity fundamentals
- Experience with incident response or SOC operations
- Familiarity with threat intelligence concepts
Audience
- Cybersecurity professionals involved in incident response
- Threat intelligence analysts
- Security teams preparing for ransomware events
14 Hours
Testimonials (2)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
All is excellent