Summary

Completed

In this module, you've learned how to identify and recover from ransomware attacks, and discovered some of the tools that can help you. You now know that you can recover from ransomware attacks through investigation and recovery steps, including quarantining compromised entities, utilizing backups, and more.

Now that you've completed this module, you should be able to:

  • Describe the different indicators of a ransomware attack.
  • Describe the different measures used to identify an attack.
  • Describe how to investigate a ransomware attack.
  • Describe how to recover from a ransomware attack.

Learn more