Small business? Micro-business? Solopreneur? How do you protect your files from ransomware and other digital disasters without a full-time IT department?

Get some basic tips to decrease your chances of a ransomware attack and increase your chances of recovery without paying the ransom if an attack happens. Learn how to create a structured file system hierarchy. Learn the meaning of NAS, RAID, and JBOD, and explore NAS devices, RAID configurations, JBOD, USB storage devices, and cloud backup – and decide what backup approach you should use.

Topics Covered:

  • Ransomware Entry Points and Threat Assessment
  • File System Hierarchy, Backup, and Recovery
  • IT Expertise Assessment and Acquisition

Who Should Attend:
Practitioners wanting to improve their defenses against ransomware attacks.

Learning Objectives
  • Identify ransomware incursion threats, targets, and entry points; and discuss techniques and resources to help defend against ransomware attacks.
  • Determine the best approach to store and backup your digital data; and discuss techniques and resources to help build and maintain a digital data disaster recovery system.
Last updated/reviewed: January 29, 2024
Prerequisites
Course Complexity: Foundational
No advanced preparation or prerequisites are required for this course.
Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Ransomware Protection on a Small Budget2:40
THE RANSOMWARE THREAT
  The What, The Player and The Evolution8:52
  Threat Defense Philosophy11:26
  Entry Points, Threat Assessment and Defense15:16
  Review0:14
FILE SYSTEM ADMINISTRATION
  Learning Objectives0:20
  File System Philosophy2:20
  File System Strategy8:26
  Backup Strategy12:08
  Backup Strategy Cont'd10:16
  Backup Software Resources4:48
  Backup Hardware Resources8:42
  Backup Hardware Resources Cont'd7:26
  Cloud Backup Resources6:27
  Backup Configuration and Process Example3:38
  Recovery Strategy2:24
  Appendix and Resources5:32
  Review0:16
CONCLUSION
  Course Review0:22
  Last Word1:22
CONTINUOUS PLAY
  Ransomware Protection on a Small Budget1:52:50
SUPPORTING MATERIAL
  Slides: Ransomware Protection on a Small BudgetPDF
  Ransomware Protection on a Small Budget GlossaryPDF
  Appendix: Ransomware Protection on a Small BudgetPDF
  Transcript: Ransomware Protection on a Small BudgetPDF
REVIEW AND TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam