{"id":3205,"date":"2021-10-25T10:30:37","date_gmt":"2021-10-25T02:30:37","guid":{"rendered":"https:\/\/www.udshk.com\/?page_id=3205"},"modified":"2022-06-07T02:29:10","modified_gmt":"2022-06-06T18:29:10","slug":"ransomeware-training","status":"publish","type":"page","link":"https:\/\/www.udshk.com\/?page_id=3205","title":{"rendered":"Ransomeware Training"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3205\" class=\"elementor elementor-3205\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0d964c7 elementor-section-full_width elementor-section-height-min-height elementor-section-height-default elementor-section-items-middle elementor-invisible\" data-id=\"0d964c7\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;animation&quot;:&quot;fadeIn&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb43ac1\" data-id=\"eb43ac1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3450ae6 elementor-widget elementor-widget-heading\" data-id=\"3450ae6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ransomeware Training<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ee50bf6 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"ee50bf6\" data-element_type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;animation_delay&quot;:300}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aec37fb\" data-id=\"aec37fb\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-254e5d2 elementor-invisible elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"254e5d2\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t        <div id=\"eael-advance-tabs-254e5d2\" class=\"eael-advance-tabs eael-tabs-horizontal\" data-tabid=\"254e5d2\">\n            <div class=\"eael-tabs-nav\">\n                <ul class=\"eael-tab-inline-icon\">\n                                            <li id=\"objective\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"fas fa-medal\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Objective<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"who-should-attend-\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-address-card\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Who Should Attend ?<\/span>\n                            \n                                                    <\/li>\n                                            <li id=\"course-detail\" class=\"inactive eael-tab-item-trigger\">\n                            \n                                                                <i class=\"far fa-file\"><\/i>                                                            \n                                                            <span class=\"eael-tab-title title-after-icon\">Course Detail<\/span>\n                            \n                                                    <\/li>\n                                    <\/ul>\n            <\/div>\n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"objective-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"objective-tab\">\n\t\t\t\t        \t\t\t\t\t        Between 2019 and 2020, ransomware attacks rose by 62 percent worldwide, and by 158 percent in North America alone, according to cybersecurity firm SonicWall\u2019s 2021 report.\n<br><br>\nRansomware is the fastest growing malware threat. Ransomware Attack, in which hackers encrypt an organization's vital data until a ransom is paid, have become a billion-dollar cybercrime industry according to the FBI.  Paying a ransom doesn\u2019t guarantee that an organization will get its data back.\n<br><br>\nOnce the infection is present, the malware begins encrypting files and folders on local drives, any attached drives, backup drives, and potentially other computers on the same network that the victim computer is attached to. Users and organizations are generally not aware they have been infected until they can no longer access their data or until they begin to see computer messages advising them of the attack and demands for a ransom payment in exchange for a decryption key. These messages include instructions on how to pay the ransom, usually with bitcoins because of the anonymity this virtual currency provides.\n<br><br>\n\nThis course will:<br>\n\u2022 Explain what constitutes Cybercrime, and different types of it.<br>\n\u2022 Provide the case study of the Colonial Pipeline Attack of 2020, the most severe Ransomware attack to date.<br>\n\u2022 Provide how people could improve their awareness to avoid the attacks.<br><br>\n\nAfter the training, the trainee will better understand what is Ransomware? How many types of Ransomware attack? What is the trend? What they need to be prepared? and what is the best practice to fight against it?\n<br><br>\n<h1>What can be learned<\/h1>\n\u2713 An understanding of how ransomware can affect our life<br>\n\u2713 Tips for preventing an attack<br>\n\u2713 Knowledge of how to protect yourself and your network\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"who-should-attend--tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"who-should-attend--tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Target Audience<\/h1>\n<ul>\n \t<li> All Users and any persons who are interested in the knowledge of the followings.<\/li>\n<ol><li> Malware<\/li>\n<li> Privacy<\/li>\n<li> Cyber Attack<\/li>\n<li> Phishing<\/li>\n<\/ol><\/ul>\n<h1>Prerequisites<\/h1>\n<ul>\n \t<li> Using Internet \/ email service experience.<\/li>\n<\/ul>\t\t\t\t                            <\/div>\n\t\t        \n                    <div id=\"course-detail-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"course-detail-tab\">\n\t\t\t\t        \t\t\t\t\t        <h1>Topic<\/h1>\n<ul>\n \t<li>What is Phishing, Pharming, Vishing and Smishing<\/li>\n \t<li>Setting up a remote data backup solution<\/li>\n \t<li>Setting up an incident response plan<\/li>\n \t<li>Testing your Ransomware Protections<\/li>\n \t<li>Learning from Past Attacks to Avoid Ransomware Attacks in the Future<\/li>\n \t<li>Adding Strong Malware Protections?<\/li>\n \t<li>Why patching?<\/li>\n \t<li>How to prevent Infection?<\/li>\n<\/ul>\n<h1>Duration<\/h1>\n<ul>\n \t<li>2 hours.<\/li>\n<\/ul>\n<h1>Medium of Instruction<\/h1>\n<ul>\n \t<li>Cantonese (complemented with English terms)\n(English terms will be used where appropriate)<\/li>\n<\/ul>\n<h1>Class Size<\/h1>\n<ul>\n \t<li>20 persons<\/li>\n<\/ul>\n<h1>Award of Certificate<\/h1>\n<ul>\n \t<li>Participants will be awarded a certificate of attendance.<\/li>\n<\/ul>\t\t\t\t                            <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ccc3a68 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ccc3a68\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-07e6a7a\" data-id=\"07e6a7a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-14c6dc8 elementor-widget elementor-widget-text-editor\" data-id=\"14c6dc8\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\tIf you are interested in this course, please contact us via info@udshk.com or (+852) 2851-0271.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ransomeware Training Objective Who Should Attend ? Course Detail Between 2019 and 2020, ransomware attacks rose by 62 percent worldwide, and by 158 percent in North America alone, according to cybersecurity firm SonicWall\u2019s 2021 report. Ransomware is the fastest growing malware threat. Ransomware Attack, in which hackers encrypt an organization&#8217;s vital data until a ransom [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3205","page","type-page","status-publish","hentry","entry","owp-thumbs-layout-horizontal","owp-btn-normal","owp-tabs-layout-horizontal","has-no-thumbnails","has-product-nav"],"_links":{"self":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3205","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3205"}],"version-history":[{"count":26,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3205\/revisions"}],"predecessor-version":[{"id":4371,"href":"https:\/\/www.udshk.com\/index.php?rest_route=\/wp\/v2\/pages\/3205\/revisions\/4371"}],"wp:attachment":[{"href":"https:\/\/www.udshk.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3205"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}