Course Outline
Understanding the Ransomware Ecosystem for Government
- Evolution and Trends of Ransomware for Government
- Common Attack Vectors and Tactics, Techniques, and Procedures (TTPs) for Government
- Identifying Ransomware Groups and Their Affiliates for Government
Ransomware Incident Lifecycle for Government
- Initial Compromise and Lateral Movement Within the Network for Government
- Data Exfiltration and Encryption Phases of an Attack for Government
- Post-Attack Communication Patterns with Threat Actors for Government
Negotiation Principles and Frameworks for Government
- Foundations of Cyber Crisis Negotiation Strategies for Government
- Understanding the Motives and Leverage of Adversaries for Government
- Communication Strategies for Containment and Resolution for Government
Practical Ransomware Negotiation Exercises for Government
- Simulated Negotiations with Threat Actors to Practice Real-World Scenarios for Government
- Managing Escalation and Time Pressure During Negotiations for Government
- Documenting Negotiation Outcomes for Future Reference and Analysis for Government
Threat Intelligence for Ransomware Defense for Government
- Collecting and Correlating Ransomware Indicators of Compromise (IOCs) for Government
- Using Threat Intelligence Platforms to Enrich Investigations and Improve Defenses for Government
- Tracking Ransomware Groups and Their Ongoing Campaigns for Government
Decision-Making Under Pressure for Government
- Business Continuity Planning and Legal Considerations During an Attack for Government
- Working with Leadership, Internal Teams, and External Partners to Manage the Incident for Government
- Evaluating Payment Versus Recovery Pathways for Data Restoration for Government
Post-Incident Improvement for Government
- Conducting Lessons Learned Sessions and Reporting on the Incident for Government
- Improving Detection and Monitoring Capabilities to Prevent Future Attacks for Government
- Hardening Systems Against Known and Emerging Ransomware Threats for Government
Advanced Intelligence & Strategic Readiness for Government
- Building Long-Term Threat Profiles for Ransomware Groups for Government
- Integrating External Intelligence Feeds into Your Defense Strategy for Government
- Implementing Proactive Measures and Predictive Analysis to Stay Ahead of Threats for Government
Summary and Next Steps for Government
Requirements
- An understanding of cybersecurity fundamentals for government use.
- Experience with incident response or Security Operations Center (SOC) operations in a public sector environment.
- Familiarity with threat intelligence concepts and tools utilized in governmental contexts.
Audience:
- Cybersecurity professionals involved in incident response for government agencies.
- Threat intelligence analysts working within the public sector.
- Security teams preparing for ransomware events in governmental organizations.
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent