We may earn an affiliate commission when you visit our partners.
Bri Frost and Aaron Rosenmund

This course discusses the Rackspace ransomware attack by the suspected PLAY threat actor group.

Read more

This course discusses the Rackspace ransomware attack by the suspected PLAY threat actor group.

In this course, Security Hot Takes: Rackspace Breach, we will discuss the Rackspace ransomware attack. We will discuss the different vulnerabilities, steps, and work-arounds the attackers took to get into the network and their actions afterwards. We will also highlight their techniques and determine what organizations can do to integrate this intel and mitigate these actions.

Enroll now

Here's a deal for you

We found an offer that may be relevant to this course.
Save money when you learn. All coupon codes, vouchers, and discounts are applied automatically unless otherwise noted.

What's inside

Syllabus

Security Hot Takes: Rackspace Breach
Additional Resources

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Explores the sophisticated techniques used by threat actors, which can enhance professionals' awareness of the latest cybersecurity threats
Taught by experienced cybersecurity professionals who have expertise in threat analysis and incident response, providing valuable insights
Involves real-world case studies and analysis of a major ransomware attack, offering practical and actionable knowledge
Suitable for individuals in cybersecurity roles, such as analysts, engineers, and incident responders, who seek to stay updated on the latest attack methods and industry best practices

Save this course

Save Security Hot Takes: Rackspace Breach to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Security Hot Takes: Rackspace Breach with these activities:
Review network security concepts
Review basic network security concepts to prepare for this course and refresh your understanding.
Browse courses on network security
Show steps
  • Read through notes or textbooks on network security fundamentals
  • Go over security protocols and their applications
  • Review common network security threats and vulnerabilities
Follow tutorials on ransomware analysis
Enhance your understanding of ransomware analysis by following guided tutorials.
Browse courses on Malware Analysis
Show steps
  • Look for online tutorials or courses on ransomware analysis
  • Follow the steps and instructions provided in the tutorials
  • Practice analyzing ransomware samples in a safe environment
Attend security conferences and webinars
Attend security conferences and webinars to connect with experts, learn about industry trends, and stay up-to-date on best practices.
Browse courses on Networking
Show steps
  • Search for upcoming security conferences and webinars
  • Register for events that align with your learning objectives
  • Attend the events and actively participate in discussions
Three other activities
Expand to see all activities and additional details
Show all six activities
Conduct mock incident response exercises
Participate in mock incident response exercises to apply your knowledge and improve your response skills.
Browse courses on Incident Response
Show steps
  • Set up a mock incident scenario based on the Rackspace breach
  • Assign roles and responsibilities to participants
  • Simulate the incident and monitor participant actions and decision-making
  • Analyze the results and identify areas for improvement
Develop a security incident response plan
Create a security incident response plan tailored to your organization's needs, based on the lessons learned from the Rackspace breach.
Browse courses on Incident Response
Show steps
  • Identify potential security risks and vulnerabilities
  • Establish clear roles and responsibilities for incident response
  • Develop response procedures for different types of security incidents
  • Test the plan through simulations and exercises
Set up a security monitoring and alerting system
Implement a security monitoring and alerting system to detect and respond to security incidents more effectively.
Browse courses on Security Monitoring
Show steps
  • Choose a security monitoring tool or platform
  • Configure the tool to monitor relevant security logs and events
  • Set up alerts for suspicious activities and potential threats
  • Establish a process for responding to alerts and investigating incidents

Career center

Learners who complete Security Hot Takes: Rackspace Breach will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
Information Security Analysts are responsible for designing, implementing, and maintaining security measures to protect an organization's information systems and data. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Information Security Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Information Security Analysts to identify and mitigate security risks, and develop and implement effective security measures.
Risk Analyst
Risk Analysts are responsible for identifying and assessing security risks. They work with stakeholders to develop and implement security policies and procedures to mitigate these risks. This course may be useful for Risk Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Risk Analysts to identify and mitigate security risks, and develop and implement effective security measures.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining security measures to protect an organization's information systems and data. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Security Engineers because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Security Engineers to identify and mitigate security risks, and develop and implement effective security measures.
Cybersecurity Analyst
Cybersecurity Analysts are responsible for protecting computer networks and systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They use their knowledge of security principles, techniques, and tools to identify, assess, and mitigate security risks. This course may be useful for Cybersecurity Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems, and how organizations can mitigate these actions.
Network Security Engineer
Network Security Engineers are responsible for designing, implementing, and maintaining security measures to protect an organization's network infrastructure. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Network Security Engineers because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Network Security Engineers to identify and mitigate security risks, and develop and implement effective security measures.
Security Consultant
Security Consultants provide advice and guidance to organizations on how to improve their security posture. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Security Consultants because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Security Consultants to identify and mitigate security risks, and develop and implement effective security measures.
Incident Responder
Incident Responders are responsible for responding to security incidents and breaches. They work with stakeholders to identify and assess the scope of the incident, and develop and implement a response plan to mitigate the damage. This course may be useful for Incident Responders because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Incident Responders to identify and mitigate security incidents, and develop and implement effective response plans.
Penetration Tester
Penetration Testers are responsible for testing the security of an organization's information systems and data. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Penetration Testers because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Penetration Testers to identify and mitigate security risks, and develop and implement effective security measures.
Malware Analyst
Malware Analysts are responsible for analyzing malware to identify its functionality and purpose. They work with stakeholders to develop and implement countermeasures to protect against malware attacks. This course may be useful for Malware Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Malware Analysts to identify and mitigate malware attacks.
Computer Forensics Analyst
Computer Forensics Analysts are responsible for investigating computer crimes and security incidents. They work with stakeholders to identify and assess the scope of the incident, and develop and implement a response plan to mitigate the damage. This course may be useful for Computer Forensics Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Computer Forensics Analysts to identify and mitigate security incidents, and develop and implement effective response plans.
Security Architect
Security Architects are responsible for designing and implementing security measures to protect an organization's information systems and data. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Security Architects because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Security Architects to identify and mitigate security risks, and develop and implement effective security measures.
Vulnerability Manager
Vulnerability Managers are responsible for identifying and managing vulnerabilities in an organization's information systems and data. They work with stakeholders to develop and implement security policies and procedures to mitigate these vulnerabilities. This course may be useful for Vulnerability Managers because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Vulnerability Managers to identify and mitigate vulnerabilities, and develop and implement effective security measures.
Threat Intelligence Analyst
Threat Intelligence Analysts are responsible for collecting and analyzing information about threats to an organization's security. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Threat Intelligence Analysts because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Threat Intelligence Analysts to identify and mitigate security risks, and develop and implement effective security measures.
Security Auditor
Security Auditors are responsible for assessing the security of an organization's information systems and data. They work with stakeholders to identify and assess security risks, and develop and implement security policies and procedures to mitigate them. This course may be useful for Security Auditors because it provides an overview of the different vulnerabilities, steps, and work-arounds that attackers can use to gain access to networks and systems. This knowledge can help Security Auditors to identify and mitigate security risks, and develop and implement effective security measures.

Reading list

We've selected 13 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Hot Takes: Rackspace Breach.
Provides a comprehensive guide to security engineering, including principles and techniques for building secure distributed systems.
Provides a comprehensive guide to incident response, including best practices and procedures for responding to security incidents.
Explores the human element of security, including techniques for identifying and exploiting vulnerabilities in human behavior.
Provides a practical guide to malware analysis, including techniques and tools for dissecting and analyzing malicious software.
Explores the principles and practices of threat modeling, including techniques for identifying and mitigating security threats.
Provides a comprehensive guide to cryptography engineering, including principles and techniques for designing and implementing secure systems.
Offers a practical guide to penetration testing, including techniques and tools for identifying and exploiting vulnerabilities.
Provides a comprehensive guide to network security, including best practices for protecting networks from cyber attacks.
While primarily focused on web application security, this text also covers related topics such as network and host security, offering a well-rounded perspective.
This practical guide provides valuable insights into the minds of hackers and their methods, with a focus on exploitation techniques.
Providing a comprehensive introduction to network security, this text valuable resource for understanding foundational concepts and protocols.
This comprehensive handbook provides a broad perspective on information security, encompassing various aspects such as social, legal, and international dimensions.

Share

Help others find this course page by sharing it with your friends and followers:
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser