Course Outline
Understanding the Ransomware Ecosystem
- Ransomware evolution and trends
- Common attack vectors and TTPs
- Identifying ransomware groups and affiliates
Ransomware Incident Lifecycle
- Initial compromise and lateral movement
- Data exfiltration and encryption phases
- Post-attack communication patterns
Negotiation Principles and Frameworks
- Foundations of cyber crisis negotiation
- Understanding adversary motives and leverage
- Communication strategies for containment
Practical Ransomware Negotiation Exercises
- Simulated negotiations with threat actors
- Managing escalation and time pressure
- Documenting negotiation outcomes
Threat Intelligence for Ransomware Defense
- Collecting and correlating ransomware indicators
- Using TI platforms to enrich investigations
- Tracking ransomware groups and campaigns
Decision-Making Under Pressure
- Business continuity and legal considerations
- Working with leadership and external partners
- Evaluating payment vs recovery pathways
Post-Incident Improvement
- Lessons learned and reporting
- Improving detection and monitoring
- Hardening systems against future attacks
Advanced Intelligence & Strategic Readiness
- Building long-term ransomware threat profiles
- Integrating external intelligence feeds
- Proactive measures and predictive analysis
Summary and Next Steps
Requirements
- An understanding of cybersecurity fundamentals
- Experience with incident response or SOC operations
- Familiarity with threat intelligence concepts
Audience
- Cybersecurity professionals involved in incident response
- Threat intelligence analysts
- Security teams preparing for ransomware events
Delivery Options
Private Group Training
Our identity is rooted in delivering exactly what our clients need.
- Pre-course call with your trainer
- Customisation of the learning experience to achieve your goals -
- Bespoke outlines
- Practical hands-on exercises containing data / scenarios recognisable to the learners
- Training scheduled on a date of your choice
- Delivered online, onsite/classroom or hybrid by experts sharing real world experience
Private Group Prices RRP from £3800 online delivery, based on a group of 2 delegates, £1200 per additional delegate (excludes any certification / exam costs). We recommend a maximum group size of 12 for most learning events.
Contact us for an exact quote and to hear our latest promotions
Public Training
Please see our public courses
Testimonials (4)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The instructor has a very wide range of knowledge and is committed to what he does. He is able to interest the listener with his course. The scope of the training fully met my expectations.
Karolina Pfajfer - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - MasterClass Certified Ethical Hacker Program
All is excellent