
Proofpoint Certified Ransomware Specialist 2025
Enrollment Closed
Spring 2025
For All Cybersecurity Levels
Certified Ransomware Specialist
Enhance your organization’s security posture
Our Certified Ransomware Specialist course equips you with knowledge of the latest ransomware threats and best practices for defense. You’ll also learn how Proofpoint's human-centric approach to threat and information protection can enhance your organization’s security posture.
Becoming certified is easy.
Session Details
Unmasking Ransomware - A Historical and Tactical Evolution
Live session on Feb. 7th, 2025
Live session on Feb. 7th, 2025
Ransomware attacks have evolved from small-scale annoyances demanding hundreds of dollars to sophisticated operations targeting entire organizations for multi-million-dollar payouts. Understanding this evolution is critical to defending against these escalating threats.
Join us for the first course as our experts explore:
- The origins and evolution of ransomware
- How ransomware tactics have shifted to “big game” hunting
- Real-world examples of ransomware attacks and their impact
Ransomware Today - Tackling the Human-Centric Threat
Live session on Feb. 14th, 2025
Live session on Feb. 14th, 2025
Almost all ransomware attacks originate from email or social engineering, making ransomware an inherently people-centric problem. To effectively combat this threat, organizations must shift their focus to proactive detection and mitigation.
Join us for the second session to learn:
- Why people are the key to understanding ransomware threats
- The latest ransomware tactics used by today’s threat actors
- How to identify and protect high-risk users and gain visibility into potential ransomware attack vectors
Building Resilience - Strategies to Prevent and Combat Ransomware
Live session on Feb. 21st, 2025
Live session on Feb. 21st, 2025
Effectively combating ransomware requires more than just reactive measures—it demands a proactive, layered defense strategy. By integrating threat intelligence, robust security practices, and incident response planning, organizations can reduce the risk and minimize the impact of ransomware attacks.
Join us for the third and last course as our experts provide actionable guidance on:
- Preventing initial infections with effective safeguards
- Interrupting ransomware lifecycles, including discovery, persistence, and data exfiltration
- Implementing best practices to mitigate risk and ensure swift recovery