Anatomy of an Attack
Published by O'Reilly Media, Inc.
Ransomware, social engineering, supply chain, AI, and quantum threats
In this course you’ll:
- Examine ransomware attacks and the operations of prominent ransomware groups
- Explore supply chain attacks and commonly used attack strategies
- Look at social engineering attack techniques and tactics
- Understand potential offensive and defensive uses of AI and quantum computing
Course description
Join cybersecurity expert Razi Rais for this series of hour-long sessions in which you’ll learn about the most common cyberattacks—ransomware, supply chain, and social engineering—and discuss the future role of artificial intelligence and quantum computing in cybersecurity.
Day 1: Ransomware
In this session, you’ll hear a history of ransomware, examine the lifespan and stages of a ransomware attack, get an overview of some well-known ransomware organizations and their strategies, and discuss the mechanisms for detecting, preventing, and recovering data from ransomware attacks.
Day 2: Social Engineering
On day 2, you’ll examine social engineering, or “the art of manipulating, influencing, or deceiving an individual in order to gain control of their digital assets or computer-based systems.” You’ll delve into social engineering attack vectors (pretexting, phishing, spear phishing, baiting, scareware, etc.), explore real-world successful social engineering cyberattacks, and discuss security best practices for preventing these attacks.
Day 3: Supply Chain
In this session, you’ll hear about the rise in supply chain attacks, discuss how this kind of attack works, and examine recent real-world attacks and the common vulnerabilities that lead to them. You’ll also get an overview of supply chain security frameworks published by standard bodies and discuss resources you can use to help mitigate these attacks.
Day 4: Artificial Intelligence and Quantum Computing
In the final session, you’ll look at threats posed by artificial intelligence and quantum computing, discuss the major challenges inherent in defending against these sophisticated, developing technologies, and gain a better understanding of the potential of these same technologies to fight the cyberattacks they enable.
NOTE: With today’s registration, you’ll be signed up for all four sessions. Although you can attend any of the sessions individually, we recommend participating in all four weeks.
What you’ll learn and how you can apply it
- Prepare for and defend against ransomware attacks
- Recognize and counter common social engineering attacks
- Improve your defenses against supply chain attacks
- Improve your cybersecurity posture by employing AI and quantum computing in cyberattack defense
This live event is for you because...
- You’re a cybersecurity leader who wants to drill down on specific threats to your operations.
- You’re an IT professional who wants to know more about cyberattacks and how to defend against them.
Prerequisites
Recommended follow-up:
- Take Zero Trust Security Fundamentals (live online course with Razi Rais)
Schedule
The time frames are only estimates and may vary according to how the class is progressing.
Day 1: Ransomware
Ransomware attack history, players, and kill chain (60 minutes)
- Presentation: History and evolution of ransomware; ransomware attacks and how they work; understanding the ransomware kill chain; key ransomware players and common monetization techniques; preparing for and preventing ransomware attacks; what to do after the attack; understanding the role of cyber insurance; security practices and frameworks to defend against ransomware attacks; resources and next steps
- Q&A
Day 2: Social Engineering
Social engineering attack techniques, examples, and prevention (60 minutes)
- Presentation: History and evolution of social engineering attacks; understanding the concept of social engineering; types of social engineering attack vectors (pretexting, phishing, spear phishing, baiting, scareware, etc.); real world examples; preventing and mitigating attacks; reports and statistics about the importance and applications of social engineering in cyber warfare; resources and next steps
- Q&A
Day 3: Supply Chain
Supply Chain Attack Techniques, Examples, and Prevention (60 minutes)
- Presentation: History and evolution of supply chain attacks; understanding supply chain attacks and their phases; real-world examples; review of security guidance and frameworks published by NIST, DOD, and the UK National Cyber Security Centre; resources and next steps
- Q&A
Day 4: Artificial Intelligence and Quantum Computing
AI and quantum computing cyberthreats (60 minutes)
- Presentation: Origins and evolution of AI and quantum computing; cybersecurity threats posed by AI; role of AI in countering cyberattacks; understanding the impact of quantum computing on cybersecurity; the move toward “quantum-resistant” or “post-quantum” cryptography; NIST and other standards bodies' work on post-quantum standardization; AI and quantum computing in the cloud; how to better plan and prepare for these technologies in the future; resources and next steps
- Q&A
Your Instructor
Razi Rais
Razi Rais is a cybersecurity and AI leader at Microsoft, with over 20 years of experience building secure, resilient systems for Fortune 500 companies worldwide. He brings a globally informed perspective to enterprise-scale security, shaped by hands-on experience living and working in Singapore, UAE, France, and the United States. His background spans engineering, architecture, and product management, giving him a unique lens on the evolving intersection of AI and cybersecurity. He drives enterprise efforts to secure AI at scale and address emerging threats using frameworks like the NIST AI Risk Management Framework, OWASP Top 10 for LLMs, and MITRE ATLAS. Razi has coauthored several books, including Zero Trust Networks, second edition, and Azure Confidential Computing and Zero Trust and is a frequent speaker at conferences such as RSA and Identiverse. He serves on the GIAC advisory board, is a Microsoft Certified Trainer and delivers AI and cybersecurity training worldwide. Connect with him on LinkedIn to follow his latest work.