Course Outline

Understanding the Ransomware Ecosystem for Government

  • Evolution and Trends in Ransomware
  • Common Attack Vectors and Tactics, Techniques, and Procedures (TTPs)
  • Identification of Ransomware Groups and Affiliates

Ransomware Incident Lifecycle for Government

  • Initial Compromise and Lateral Movement
  • Data Exfiltration and Encryption Phases
  • Post-Attack Communication Patterns

Negotiation Principles and Frameworks for Government

  • Foundations of Cyber Crisis Negotiation
  • Understanding Adversary Motives and Leverage
  • Communication Strategies for Containment

Practical Ransomware Negotiation Exercises for Government

  • Simulated Negotiations with Threat Actors
  • Managing Escalation and Time Pressure
  • Documenting Negotiation Outcomes

Threat Intelligence for Ransomware Defense for Government

  • Collecting and Correlating Ransomware Indicators
  • Using Threat Intelligence Platforms to Enrich Investigations
  • Tracking Ransomware Groups and Campaigns

Decision-Making Under Pressure for Government

  • Business Continuity and Legal Considerations
  • Collaboration with Leadership and External Partners
  • Evaluating Payment Versus Recovery Pathways

Post-Incident Improvement for Government

  • Lessons Learned and Reporting
  • Enhancing Detection and Monitoring Capabilities
  • Strengthening Systems Against Future Attacks

Advanced Intelligence & Strategic Readiness for Government

  • Building Long-Term Ransomware Threat Profiles
  • Integrating External Intelligence Feeds
  • Proactive Measures and Predictive Analysis

Summary and Next Steps for Government

Requirements

  • A comprehensive understanding of cybersecurity fundamentals
  • Practical experience with incident response or Security Operations Center (SOC) operations
  • Knowledge of threat intelligence principles and applications

Audience for Government

  • Cybersecurity professionals engaged in incident response activities
  • Threat intelligence analysts responsible for identifying and mitigating threats
  • Security teams tasked with preparing for and responding to ransomware incidents
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories