Sales Ended

(Hong Kong) CSI901: Protecting Against Ransomware (HackerU Israel)

Event Information

Share this event

Date and Time

Location

Location

Cyber Security Training Co. Ltd.

30 Canton Road

Tsim Sha Tsui

Hong Kong

View Map

Refund Policy

Refund Policy

Refunds up to 30 days before event

Event description

Description

GUESET COURSE PROVIDER: HackerU Israel

COURSE SCHEDULE:

0900 - 1800 Each Day | Tuesday, May 29, 2018 - Friday, June 1, 2018

TOTAL DURATION: 32 Hours

CSI901: Protecting Against Ransomware

  • Certification Level: Intermediate | Cybersecurity Knowledge| Gray Cyberwolf
  • Certificate Title: Protecting Against Ransomware Certificate
  • Delivery Method: Live Classroom
  • 32 Continuing Education / Professional Development Units
  • Laptop Required

Overview

Through our relationship with HackerU Israel, Cyber Security Training Company Limited is pleased to bring our clients across Asia the knowledge and expertise from the best in the Israeli cyber security industry, which is internationally recognized as one of the most resilient in the world. There has never been a better opportunity for clients across Asia to tap into Israel’s latest, most practical global cyber content.

A ransomware attack involves malicious software that is downloaded onto a victim’s device, and then used to encrypt the victim’s information. Hackers that initiate these attacks threaten to block access to the files until a ransom is paid. Ransomware attacks are becoming increasingly wide-spread these days; the most common ways for the malicious software to be installed on a victim’s device is through phishing emails, malicious ads on websites, and questionable apps and programs.

Prominent target groups of ransomware attacks are critical infrastructure establishments, state organizations, major enterprises, as well as small-to-medium businesses that don’t have a strong cyber security protection implemented. Any company or organization depending on daily access to critical data should be most worried about ransomware.

How is a ransomware attack originated? How easily can hackers access your network? How to prevent ransomware attacks and how to respond to them once they have occurred? What is the best protection against ransomware?

The Protecting Against Ransomware course was especially designed for IT and security teams to equip them with an in-depth understanding of the security threat landscape affecting their organization, and the corresponding mitigation methods. By the end of the training, participants will have an extensive amount of knowledge on how to implement the right security measures in their organization, handle various types of security incidents - ransomware in particular – and practice all they have learnt hands-on.

Agenda

Day 1

Cyber security basics

  • Malware
  • Viruses
  • Trojans
  • Phishing – case studies
  • Keyloggers
  • MiTM attacks explained
  • Anti-virus and how it works + demo
  • OSI model – the 8th layer

Hacking with Linux

  • Linux as an OS
  • Linux command line
  • Scripting with grep, sed and awk

Password security

  • Password complexity
  • Demo: how your passwords can be easily hacked
  • Online vs. offline password hacking methods
  • Brute-force attack methods
  • Password-attack mitigation for the enterprise

Browsing risks

  • Demo: JavaScript attacks
  • SQL injection
  • XSS
  • RFI and LFI
  • Email phishing + demo (spam mail simulation)
  • Social engineering + demo (setting your own phishing pages)

Day 2

Virtualization

  • Bridged vs. NAT explained from the hacker’s point of view
  • Isolating your virtual machine
  • Configuring the virtual machine to serve as the lab environment

Introduction to Advanced Persistent Threats

  • The post-exploitation phase
  • Pivoting through the enterprise networks

Introduction to Metasploit Framework

  • Auxiliary + demo
  • Exploits + demo
  • Trojans
  • Msfvenom as creation tool
  • Bind

Day 3

Introduction to ransomware

  • What is ransomware?
  • Ransomware attack vectors
  • How ransomware can affect your organization
  • Ransomware extensions

Types of ransomware

  • Locker
  • Crypto
  • Hybrid

Delivery Channels

  • Malware advertisement
  • Phishing emails
  • Downloaders
  • Ransomware-as-a-Service

Ransomware attacks

  • Case study: recent ransomware attacks analyzed
  • Targets of ransomware
  • Payment: should you pay or not?

Day 4

Prevention

  • Backup and recovery
  • Network share access security
  • Email and executable controls security
  • Security endpoints

Response

  • Ransomware analysis methodology
  • Hardening your enterprise system
  • Separate networks
  • Scanning the organization network

Report

  • How to write a ransomware attack report?
  • To whom should you report?

Objectives​

  • Getting to know the cyber security threat landscape through real-time demos.
  • Identifying existing security vulnerabilities in the processes, infrastructure and human behavior within organizations.
  • Handling the most common cyber security incidents from both the technical and operational perspectives.
  • Possessing the knowledge to evaluate different solutions available on the market to support the protection of the organization.
  • Experiencing in real-time the life-cycle of various attacks, with considerable in-depth exploration of ransomware.
Share with friends

Date and Time

Location

Cyber Security Training Co. Ltd.

30 Canton Road

Tsim Sha Tsui

Hong Kong

View Map

Refund Policy

Refunds up to 30 days before event

Save This Event

Event Saved