On June 27th, 2017, this new threat attacked thousands of computers around the globe and wiped everything off their disks. NotPetya is a destructive wiper malware, with the sole aim of destroying your data in such a way that the possibility of recovering your files is minimal. Companies and agencies around the world, including Ukraine, Russia, USA, parts of Europe, Asia, and Australia, have been victim to the attack and might never be able to recover their data.
What can you do to safeguard against this latest global cyber threat?
With the brand new Alison course – “Protect Your PC against the NotPetya Cyber Attack”, you can guard yourself, family, and work colleagues against this virus by studying and sharing this course. This course will teach you how the virus has been spread, the consequences when it takes hold of a network, and what you can do to prevent an attack. If your computer has already been infected, you will learn about the potential solutions that may be able to assist you in restoring your device. Cyber security is everyone’s responsibility. So protect yourself and others, and spread awareness! Enroll today and start learning.
Protect Your PC against the NotPetya Cyber Attack Course Content
This free online course will teach you about how the NotPetya virus has been spread, what the virus does once it takes hold of a network, and furthermore, what you can do prevent an attack. If your computer has already been infected by the NotPetya virus, you will learn about potential solutions that may be able to assist you in the restoration of your device.
This free online course will be of great interest to those who believe they may be at risk to ransomware and cyber-attacks, those who wish to protect themselves from NotPetya, or those who wish to better understand how these cyber-attacks take place.
After completing this course, you will be able to:
- Recognize what Petya is.
- Identify where the majority of NotPetya attacks took place.
- Explain the purpose of the Windows tool CHKDSK.
- Define ransomware.
- Identify who developed the EternalBlue exploit and who leaked the EternalBlue exploit.
- Explain what SMB stands for.
Summary of Main Course Features
Instructor: Advance Learning
Duration: 1-2 Hours
Academic Level: Workplace – Professional – Level 1
Note: This post contains affiliate links and I may be compensated if you click on them.