Skip to main content

Ransomware 499: Ransomware Response and Recovery

  • Duration: 8 hours
  • Delivery Options: Online, In-person, Hybrid

This one-day ransomware course introduces learners to the basics of ransomware and provides a live, scenario-based learning experience for all attendees.  Attendees will receive tools necessary to respond to future ransomware attacks. 

Who should take this course

RW-499 is designed for incident responders, managers, and executives. It is recommended that participants have at least a basic understanding of cyber and cyber-related risks along with working knowledge of business processes.

How can you take this course


Available online live with an instructor


Available in-person either at Purdue or at your location.


Available as a combination of online and in-person

What tools you will use

Participants will use tools such as Incident Response templates, Palo Alto Firewalls, McAfee EPO, and Ransomware playbooks.

What you can expect from Ransomware 499: Ransomware Response and Recovery

This one-day course introduces learnings to the history and risk of ransomware. Participants will navigate a real-world ransomware scenario on the Purdue Cyber Range in which they will use the tools provided to respond to future attacks. The range instructor can provide debriefing and additional details on the specific use of ransomware and the playbooks.  

Key Takeaways

For Organizations:

  • Upskill current workforce  
  • Get hands-on with industry tools in virtual labs.
  • Harden defenses by finding exploits first.

For Individuals:

  • Gain an understanding of network traffic.
  • Learn industry tools in virtual labs.
  • Taught remotely or in-person


RW-499 is designed for corporate and cyber teams. The course is taught through a ransomware scenario on the Purdue Cyber Range with a debriefing by a range instructor over the course of a day.  

Purdue Cyber Range is a virtual testing ground that allows individuals and teams to experience both defensive and offensive cyberattack scenarios. Each scenario is overseen by a Range Master, ensuring your team's experience is as educational as possible. 

Course Topics

Ransomware Fundamentals: Understand and explain the basics of ransomware along with an understanding of ransomware history.  

Incident Response: Practice development and implementation of a ransomware playbook in the event of an attack.

Tech Requirements

It is recommended that all of cyberTAP courses be taken on a laptop or PC that runs either Windows or Linux as an operating system. We also recommended to have a fast and reliable internet access.

Are you interested in learning more?

cyberTAP's comprehensive approach to teaching cyber fundamentals and building practical skills through applied technical training is perfect for those interested in starting a new career, learning a new skill, experiencing a cyberattack firsthand, or making a team around cybersecurity. Our programs are fully customizable to offer a tailored solution for individual and corporate needs. Let's get in touch and see just how cyberTAP can partner with you and develop a training program just for you and your team. 

Get Started

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at