Course Outline

Understanding the Ransomware Ecosystem

  • Evolution and trends of ransomware
  • Common attack vectors and tactics, techniques, and procedures (TTPs)
  • Identifying ransomware groups and their affiliates

Ransomware Incident Lifecycle

  • Initial compromise and lateral movement within the network
  • Data exfiltration and encryption phases of an attack
  • Post-attack communication patterns with threat actors

Negotiation Principles and Frameworks

  • Foundations of cyber crisis negotiation strategies
  • Understanding the motives and leverage of adversaries
  • Communication strategies for containment and resolution

Practical Ransomware Negotiation Exercises

  • Simulated negotiations with threat actors to practice real-world scenarios
  • Managing escalation and time pressure during negotiations
  • Documenting negotiation outcomes for future reference and analysis

Threat Intelligence for Ransomware Defense

  • Collecting and correlating ransomware indicators of compromise (IOCs)
  • Using threat intelligence platforms to enrich investigations and improve defenses
  • Tracking ransomware groups and their ongoing campaigns

Decision-Making Under Pressure

  • Business continuity planning and legal considerations during an attack
  • Working with leadership, internal teams, and external partners to manage the incident
  • Evaluating payment versus recovery pathways for data restoration

Post-Incident Improvement

  • Conducting lessons learned sessions and reporting on the incident
  • Improving detection and monitoring capabilities to prevent future attacks
  • Hardening systems against known and emerging ransomware threats

Advanced Intelligence & Strategic Readiness

  • Building long-term threat profiles for ransomware groups
  • Integrating external intelligence feeds into your defense strategy
  • Implementing proactive measures and predictive analysis to stay ahead of threats

Summary and Next Steps

Requirements

  • An understanding of cybersecurity fundamentals
  • Experience with incident response or Security Operations Center (SOC) operations
  • Familiarity with threat intelligence concepts and tools

Audience:

  • Cybersecurity professionals involved in incident response
  • Threat intelligence analysts
  • Security teams preparing for ransomware events
 14 Hours

Delivery Options

Private Group Training

Our identity is rooted in delivering exactly what our clients need.

  • Pre-course call with your trainer
  • Customisation of the learning experience to achieve your goals -
    • Bespoke outlines
    • Practical hands-on exercises containing data / scenarios recognisable to the learners
  • Training scheduled on a date of your choice
  • Delivered online, onsite/classroom or hybrid by experts sharing real world experience

Private Group Prices RRP from £3800 online delivery, based on a group of 2 delegates, £1200 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.

Contact us for an exact quote and to hear our latest promotions


Public Training

Please see our public courses

Testimonials (5)

Provisional Upcoming Courses (Contact Us For More Information)

Related Categories