Ransomware: Effective Defense and Recovery - Training Courses | Afi U.
afiU logo
Explore our 2025-2026 catalogue View all courses
Training and Coaching

Cultivate a learning organization and develop talent.

Customer Experience

Optimize your processes for operational excellence.

Employee Experience

Engage, empower, and enhance employee well-being.

Artificial Intelligence

Master AI and automate your processes.

Leadership

Develop key skills to inspire and mobilize.

Digital Tools

Boost collaboration and productivity within your teams

Strategy and Performance

Align your goals for sustainable growth.

Digital Transformation

Leverage technology to innovate and accelerate your growth.

ContactFAQ

New

Ransomware: Effective Defense and Recovery

Hands-on training to prevent, detect, and respond to ransomware attacks, featuring real-world cases to strengthen participants’ defense and resilience.
Private session

This training is available in a private or personalized format. It can be provided in one of our training centres or at your offices. Call one of our consultants of submit a request online.

Call now at 1 877 624.2344

  • Duration: 1 day
  • Regular price: On request

Course outline

Duration : 1 Day

© AFI par Edgenda inc.

This practical course equips participants with strategies to prevent, detect, and recover from ransomware incidents. Using real-world case studies, learners will build resilient defense and recovery capabilities.

Audience

Security teams, IT directors, CISOs, and business continuity managers.

Prerequisites

  • General knowledge of cybersecurity practices
  • Familiarity with system administration or IT operations helpful

Objectives

  • Understand ransomware attack methods and impacts
  • Implement prevention strategies and user awareness
  • Develop recovery and continuity plans
  • Learn from case studies and exercises

Contents

Module 1: Understanding Ransomware

  • History and evolution of ransomware
  • Common attack vectors and techniques
  • Business and operational impacts

Module 2: Prevention Strategies

  • Endpoint and network defense
  • Backup and recovery planning
  • Security awareness training

Module 3: Detection and Response

  • Indicators of compromise
  • Incident response playbooks
  • Forensic considerations

Module 4: Recovery and Lessons Learned

  • Business continuity and disaster recovery planning
  • Case study: major ransomware attacks
  • Continuous improvement and resilience planning