Course Information

Duration

Minimum of 40 Hours

Exam Time

2 Hours Exam

Course Type

Self Paced / Blended / Classroom

Structure

Curriculum

Day 1

  • Malware Ransomware Awareness - CS00105
  • Information Security and Privacy Awareness – CS00101
  • Cloud Security Awareness - CS00102

Day 2

  • Access Control Awareness Part I - CS00201
  • Access Control Awareness Part II - CS00202
  • Email Security and Egress Firewall Whitelisting –

Day 3

  • Social Engineering & Phishing Awareness Part I - CS00103
  • Social Engineering & Phishing Awareness Part II – CS00104
  • Breach Notification Awareness Part I – CS00301

Day 4

  • Breach Notification Advanced Part II – CS00302
  • Breach Notification Advanced Part III – CS00303
  • Breach Notification Advanced Part IV – CS00304

Day 5

  • Business Continuity Disaster Recovery Part IV - DR00105
  • Business Continuity & Disaster Recovery Awareness Part V - DR00105
  • Exam

Course Details

Malware Ransomware Awareness - CS00105


The course includes cybersecurity and privacy knowledge test as users progress through the training. The training is designed to protect and preserve the confidentiality, integrity, and availability of information owned by or in the care of the corporation.


Information Security and Privacy Awareness – CS00101


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Cloud Security Awareness - CS00102


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Access Control Awareness Part I - CS00201


The course provides in-depth knowledge of risk management concepts and fundamentals. The course improves risk awareness, promotes an open risk culture, and inclusion of risk in the decision-making process.Risk is defined as the potential for loss or damage when a threat exploits a vulnerability.


Access Control Awareness Part II - CS00202


The course is designed to educate employees to understand how malware can infect your device, how you can avoid malware, and what action you need to take when you get infected by malware.


Email Security and Egress Firewall Whitelisting


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Social Engineering & Phishing Awareness Part I - CS00103


The course is designed for organizations that need to comply with the regulatory requirements, support phishing awareness campaigns, and educate employees about the impact of social engineering attacks, especially those having exposure to private data, financial data, and highly sensitive and confidential data.


Social Engineering & Phishing Awareness Part II – CS00104


Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday.


Breach Notification Awareness Part I – CS00301


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Breach Notification Advanced Part II – CS00302


Incident management (IM) is a key component of any business resiliency program. The primary focus of IM is to restore normal operations and services as quickly as possible after an unforeseen event.


Breach Notification Advanced Part III – CS00303


This course presents information on how employees can contribute to your organization's security. The course provides a comprehensive review of the knowledge required for understanding workplace security risks and actions that need to be taken by employees.


Breach Notification Advanced Part IV – CS00304


The framework design is the key for organizations to move from their current state to their target state with the ability to identify gaps and prioritize gaps based on risk assessment.


Breach Notification Advanced Part IV – CS00304


This BCP and DR awareness course will provide every employee in the organization with basic knowledge about disasters, risks covered by DR, use cases, challenges, DR plans, etc.


Breach Notification Advanced Part V – CS00305


Business Process Management (BPM) is a systematic approach to making an organization's processes more efficient and dynamic to meet the business's changing needs.


Exam


You have total 3 attempts for this exam.

The certification course Ransomware is based on Cybersecurity and Infrastructure Security Agency (CISA) Ransomware guide (CISA Incident Response).

The Ransomware guide stresses the need for the following controls and technology in place: Phishing Simulation, Back up, Egress Firewall Whitelisting, Email Control, End point protection, Multi Factor Authentication, Security Awareness Training, Breach Management and Disaster Recovery.

Ransomware is a malicious type of that denies access to computers and files, either specific or entire system with sensitive information until a ransome is paid.

While ransome attacks does not result in a data breach, however cyber criminals have been moving towards taking a copy of the data before encryption and then threatening to expose the data. Combating a ransomware scenario can be stressful, so most organizations think it is better to have controls in place to protect from an attack.

To evaluate the maturity of your organization's process and controls and to better protect and combat ransomware, the course prepare trainee to follow CISA Ransomware guidance. It’s important now, more than ever, to have trained, skilled professionals to manage ransomware incidents.

The 60-hour curriculum and three-hour exam is a challenging program that takes a multidisciplinary approach to attain proficiency in relevant domains, and modern information security.

The course enhances knowledge about privacy data collection, processing and global regulatory impact on data privacy.

  • You are currently studying non-technical field and you want to learn on how to keep data secure (such as corporate information, bank data, personal data, health data, accounts information) by timely reporting of incidents and early understanding what could be breach.
  • Your role in the organization as first cyber defendant requires through understanding of ransomware and malware incidents.
  • You are first in the line of defense and need to communicate the ransomware attack to the organization and management.
  • You are currently studying technical field such as engineering or anything remotely related to technology then you want to expand your cyber knowledge, protect from hacks, investigate hacks, protect from attacks, protect data and learn hands-on skills to apply on the job.
  • The nature of business you are in, or your corporation handles highly sensitive data, and you wish to learn hands-on skills to protect the data.
  • You are a tech enthusiast looking to start your career in tech and get your foot in the door in the world of networking and security on a stable, safe, and resilient cyberspace.
  • This provides a practical look into how things play out in the event of a ransomware and what is expected of everyone in such a scenario.
Excel Your Career and Contribute to the Organization Growth

The program focuses on creating new career opportunities through extensive, meticulous knowledge with enhanced level capabilities for dynamically contributing to a privacy and compliance team.

  • The employees will learn key concepts of ransomware, ransomware defense, breach management, and recovery.
  • Learn to differentiate ransomware. malware and other social engineering attacks.
  • Enhance your understanding of the ransomware defense management process.
  • Learn to identify ransomware incidents, critical success factors, and key performance indicators specific to IM.
  • Learn the process of breach communication internal to the organization and very importantly communicating with outsiders.
  • Learn about legal responsibilities, applicable laws, and data breach response plan.
  • Learn to create effective ransomware response, document policy, plan and procedure.
  • You will have better understanding of your roles, and do’s and don’ts.
  • The course will train you on establishing problem management process roles and responsibilities, step by step approach in implementing key processes, defining process inputs/outputs, and reporting.

Various Job Oppoortunites are :


  • Cybersecurity Consultant/
    Advisor/Analyst
  • Systems Security Analyst
  • IT Analyst
  • Developers
  • Systems Analyst/
    Managers
  • Architect
  • Cybersecurity Operations
    Specialist
  • SOC Analyst
  • Compliance Auditor
  • Incident Response Analyst
  • Network or System
    Security Administration
  • Vulnerability Assessment
    Analyst
  • IT Auditor
  • Information Assurance
    Specialist

Eligibility :

The candidate studying in diploma or undergraduate degree course is eligible for the certification course. Its highly recommended that candidate complete basic Incident, Breach and Problem management certification prior to Ransomware Cert.

Take Exam

The candidate is eligible for CSC Council exam if he meets the Eligibility criteria listed below :

  • Applicants who do not attend training must prove 1 year of work experience in the compliance area
  • Applicants who are instructors, trainers, and PhDs shall also be eligible if they meet the above criteria.
  • On the application, there is a section for the applicant to list a boss, supervisor, or department lead who will act as their verifier.
  • If further information is requested from the applicant after the application is submitted and 90 days pass with no response from the applicant, the application will be automatically rejected, and a new form will have to be submitted.
  • If application is not approved, the application fee of USD 100 will not be refunded.
  • If the application is approved, then candidate must take exam in 15 working days

Apply Now

CSC - Certified Ransomware Prevention Specialist (CRPS)

Ransomware Prevention Specialist (CRPS)

The certification course Ransomware is based on Cybersecurity and Infrastructure Security Agency (CISA) Ransomware guide (CISA Incident Response). Ransomware is a malicious type of that denies access to computers and files, either specific or entire system with sensitive information until a ransome is paid.

Material of Ransomware

The Ransomware guide stresses the need for the following controls and technology in place: Phishing Simulation, Back up, Egress Firewall Whitelisting, Email Control, End point protection, Multi Factor Authentication, Security Awareness Training, Breach Management and Disaster Recovery.

The 60-hour curriculum and three-hour exam is a challenging program that takes a multidisciplinary approach to attain proficiency in relevant domains, and modern information security.

Price of the Course Ransomware

Price: $ 750.00

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

Ransomware Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

CSC - Certified Ransomware Prevention Specialist (CRPS)

Ransomware Prevention Specialist (CRPS)

The certification course Ransomware is based on Cybersecurity and Infrastructure Security Agency (CISA) Ransomware guide (CISA Incident Response). Ransomware is a malicious type of that denies access to computers and files, either specific or entire system with sensitive information until a ransome is paid.

Material of Ransomware

The Ransomware guide stresses the need for the following controls and technology in place: Phishing Simulation, Back up, Egress Firewall Whitelisting, Email Control, End point protection, Multi Factor Authentication, Security Awareness Training, Breach Management and Disaster Recovery.

The 60-hour curriculum and three-hour exam is a challenging program that takes a multidisciplinary approach to attain proficiency in relevant domains, and modern information security.

Price of the Blended Course

Price: $ 900.00


The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.

Ransomware Course Details

In this extremely competing world of cloud and complex offerings, one faces unique security challenges on an almost day-to-day basis.

The course is designed to pass on the extensive knowledge of the security, risk management, and oversight controls at a service organization relevant to security, availability, processing integrity confidentiality, privacy.


Contact Us for Classroom Course Schedule

Disclaimer

CSC-Council reserves the right to impose additional restriction to comply with the policy.

Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council.

CSC-Council reserves the right to revoke the certification of any person in breach of this requirement.