Protect Your PC against the NotPetya Cyber Attack
Learn about a hugely important cyber-weapon attack called NotPetya, and how to protect yourself against a cyber-attack.
Take this certificate on your own.
Start now and learn at your own pace.
CertificationView course modules
First, you will be introduced to Petya malware. Petya is a family of encrypting ransomware that targets Microsoft Windows-based systems. It was first discovered in 2016 and infects the master boot record to execute a payload that encrypts a hard drive's file system table which prevents Windows from booting. You will then look at the NotPetya attack that took place on June 27th, 2017, which is said to be the most devastating cyber attack in history.
Next, you will examine the EternalBlue exploit and its role in the creation of Wannacry, Petya, and NotPetya. You will learn who developed the EternalBlue exploit and look into the Shadow Brokers hacker group. Finally, the course will teach you how NotPetya gains access to your system, the effects that this will have on your computer system, and the preventative measures you can take to avoid a NotPetya attack.
Individuals and companies big or small rely on the computer for their day to day business activities. A glitch in the computer system will not only disrupt workflows but may also result in serious financial losses. This makes it essential to learn to protect oneself from NotPetya and other ransomware and cyber attack malware. Don't wait for something as dire as the NotPetya cyber attack to hit you. Take this course now and learn how to protect your computer systems today.Start Course Now
Module 1: Introduction to Petya and NotPetya Malware
Module 1: Learning Outcomes
What is Petya Malware?
EternalBlue and its Role in the Creation of WannaCry, Petya, and NotPetya
NotPetya: Process, Prevention, and Recovery
Module 1: Lesson Summary
After completing this course, you will be able to:
- Recognise what Petya is;
- Identify where the majority of NotPetya attacks took place;
- Explain the purpose of the Windows tool CHKDSK;
- Define ransomware;
- Identify who developed the EternalBlue exploit and who leaked the EternalBlue exploit;
- Explain what SMB stands for;
- Discuss the differences between Petya and NotPetya;
- Identify the different methods NotPetya uses to gain access to your system, as well as what NotPetya does to your computer system;
- Recognise the preventive measures for avoiding a NotPetya attack, as well as what to do following a NotPetya attack.
All Alison courses are free to enrol, study and complete. To successfully complete this Certificate course and become an Alison Graduate, you need to achieve 80% or higher in each course assessment. Once you have completed this Certificate course, you have the option to acquire official Certification, which is a great way to share your achievement with the world. Your Alison Certification is:
Ideal for sharing with potential employers - include it in your CV, professional social media profiles and job applications
An indication of your commitment to continuously learn, upskill and achieve high results
An incentive for you to continue empowering yourself through lifelong learning
Alison offers 3 types of Certification for completed Certificate courses:
Digital Certificate - a downloadable Certificate in PDF format, immediately available to you when you complete your purchase
Certificate - a physical version of your officially branded and security-marked Certificate, posted to you with FREE shipping
Framed Certificate - a physical version of your officially branded and security-marked Certificate in a stylish frame, posted to you with FREE shipping
All Certification is available to purchase through the Alison Shop. For more information on purchasing Alison Certification, please visit our faqs. If you decide not to purchase your Alison Certification, you can still demonstrate your achievement by sharing your Learner Record or Learner Achievement Verification, both of which are accessible from your Dashboard. For more details on our Certification pricing, please visit our Pricing Page.