Course Outline
Understanding the Ransomware Ecosystem
- Ransomware evolution and trends
- Common attack vectors and TTPs
- Identifying ransomware groups and affiliates
Ransomware Incident Lifecycle
- Initial compromise and lateral movement
- Data exfiltration and encryption phases
- Post-attack communication patterns
Negotiation Principles and Frameworks
- Foundations of cyber crisis negotiation
- Understanding adversary motives and leverage
- Communication strategies for containment
Practical Ransomware Negotiation Exercises
- Simulated negotiations with threat actors
- Managing escalation and time pressure
- Documenting negotiation outcomes
Threat Intelligence for Ransomware Defense
- Collecting and correlating ransomware indicators
- Using TI platforms to enrich investigations
- Tracking ransomware groups and campaigns
Decision-Making Under Pressure
- Business continuity and legal considerations
- Working with leadership and external partners
- Evaluating payment vs recovery pathways
Post-Incident Improvement
- Lessons learned and reporting
- Improving detection and monitoring
- Hardening systems against future attacks
Advanced Intelligence & Strategic Readiness
- Building long-term ransomware threat profiles
- Integrating external intelligence feeds
- Proactive measures and predictive analysis
Summary and Next Steps
Requirements
- An understanding of cybersecurity fundamentals
- Experience with incident response or SOC operations
- Familiarity with threat intelligence concepts
Audience
- Cybersecurity professionals involved in incident response
- Threat intelligence analysts
- Security teams preparing for ransomware events
Testimonials (3)
The trainer was very knowledgable and took time to give a very good insight into cyber security issues. A lot of these examples could be used or modified for our learners and create some very engaging lesson activities.
Jenna - Merthyr College
Course - Fundamentals of Corporate Cyber Warfare
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
All is excellent