Course Outline

Understanding the Ransomware Ecosystem for Government

  • Evolution and Trends of Ransomware for Government
  • Common Attack Vectors and Tactics, Techniques, and Procedures (TTPs) for Government
  • Identifying Ransomware Groups and Their Affiliates for Government

Ransomware Incident Lifecycle for Government

  • Initial Compromise and Lateral Movement Within the Network for Government
  • Data Exfiltration and Encryption Phases of an Attack for Government
  • Post-Attack Communication Patterns with Threat Actors for Government

Negotiation Principles and Frameworks for Government

  • Foundations of Cyber Crisis Negotiation Strategies for Government
  • Understanding the Motives and Leverage of Adversaries for Government
  • Communication Strategies for Containment and Resolution for Government

Practical Ransomware Negotiation Exercises for Government

  • Simulated Negotiations with Threat Actors to Practice Real-World Scenarios for Government
  • Managing Escalation and Time Pressure During Negotiations for Government
  • Documenting Negotiation Outcomes for Future Reference and Analysis for Government

Threat Intelligence for Ransomware Defense for Government

  • Collecting and Correlating Ransomware Indicators of Compromise (IOCs) for Government
  • Using Threat Intelligence Platforms to Enrich Investigations and Improve Defenses for Government
  • Tracking Ransomware Groups and Their Ongoing Campaigns for Government

Decision-Making Under Pressure for Government

  • Business Continuity Planning and Legal Considerations During an Attack for Government
  • Working with Leadership, Internal Teams, and External Partners to Manage the Incident for Government
  • Evaluating Payment Versus Recovery Pathways for Data Restoration for Government

Post-Incident Improvement for Government

  • Conducting Lessons Learned Sessions and Reporting on the Incident for Government
  • Improving Detection and Monitoring Capabilities to Prevent Future Attacks for Government
  • Hardening Systems Against Known and Emerging Ransomware Threats for Government

Advanced Intelligence & Strategic Readiness for Government

  • Building Long-Term Threat Profiles for Ransomware Groups for Government
  • Integrating External Intelligence Feeds into Your Defense Strategy for Government
  • Implementing Proactive Measures and Predictive Analysis to Stay Ahead of Threats for Government

Summary and Next Steps for Government

Requirements

  • An understanding of cybersecurity fundamentals for government use.
  • Experience with incident response or Security Operations Center (SOC) operations in a public sector environment.
  • Familiarity with threat intelligence concepts and tools utilized in governmental contexts.

Audience:

  • Cybersecurity professionals involved in incident response for government agencies.
  • Threat intelligence analysts working within the public sector.
  • Security teams preparing for ransomware events in governmental organizations.
 14 Hours

Number of participants


Price per participant

Testimonials (4)

Upcoming Courses

Related Categories