Overview

In this course, you’ll learn the common methods which make ransomware attacks successful.

After completing this online training course, students will be able to:

  • Describe how we may become a victim of ransomware

All computer users

None

01. Ransomware Distribution Methods
02. How an Email Attachment Can Lead to Ransomware
03. How Unsafe Browsing Can Lead to Ransomware
04. How USB Drives Can Lead to Ransomware
05. How Office Macros Can Lead to Ransomware