Detect and Respond to Threats: Ransomware and Extortion
Sep 1, 2025 - Sep 28, 2025
1.5 CEUs
Sorry! The enrollment period is currently closed. Please check back soon.
Full course description
COURSE DESCRIPTION
In today's healthcare environment, the increasing threat of ransomware and extortion poses critical risks to patient safety, data integrity, and organizational operations. This course will provide you with an in-depth understanding of how to detect and respond to these threats effectively. You will explore real-world case studies, learn about the tactics cybercriminals use to exploit healthcare systems, and develop the skills needed to implement robust detection mechanisms. The course also covers incident response strategies, including how to mitigate damage, recover from attacks, and prevent future breaches.
LEARNING OUTCOMES
Identify Common Ransomware and Extortion Techniques: You will understand the methods and tools used by cybercriminals to target healthcare organizations, and recognize the early warning signs of a potential attack.
Analyze the Impact of Ransomware on Healthcare Operations: You will learn how ransomware and extortion can disrupt patient care, compromise sensitive data, and affect organizational integrity.
Develop Effective Detection Strategies: You will implement advanced threat detection techniques, such as EDR/MDR, network monitoring, user identity behavior monitoring to identify ransomware activities before they escalate.
Execute a Comprehensive Incident Response Plan: You will create and apply a structured approach to respond to ransomware and extortion events, minimizing downtime and safeguarding patient data.
Mitigate the Risk of Ransomware Attacks: You will learn how to apply best practices in cybersecurity to prevent attacks, such as air gapped backups, continuous threat exposure management, and user awareness training.
Implement Proactive Measures Against Future Threats: You will use insights gained from incidents to improve security postures and prevent future ransomware and extortion attempts.
WHO SHOULD ENROLL
This program is designed for experienced U.S. healthcare professionals from a variety of healthcare or healthcare-related settings who want to enhance their careers, including:
- Clinical professionals,
- Healthcare administrators,
- Information Technology professionals, including Cybersecurity,
- Emergency preparedness professionals,
- Risk managers, and
- Other healthcare professionals.
This program is not designed for those looking to enter the healthcare field. Learners should have at least two years of U.S. healthcare-related experience and a college degree, or five years of U.S. healthcare-related experience without a college degree.
REGISTRATION PROCESS
Step 1 – Check your eligibility. Submit a Registration Approval Request to confirm eligibility for the program at least two weeks prior to the course start date.
Step 2 – Register and submit payment. After you receive notification via email that you have been approved to register, you must complete and return a Registration Form and payment at least two weeks prior to the course start date.
ADDITIONAL INFORMATION
This course is delivered primarily via asynchronous instruction, meaning that learners can work at their own pace. During the fourth week of the course, there will be a live, online session with the course instructor.
Textbook Information
Upon enrollment confirmation, learners will be mailed a complimentary copy of Enterprise Risk Management as a Value Creator textbook by Mr. Bob Chaput.
Digital Badge
Upon successful completion of this four-week microcredential course, you will be awarded a competency-based digital badge demonstrating specific knowledge and skills related to the course topic.
If you are pursuing the badge for the Leadership in Healthcare Cyber Risk Management program, you have two years to complete all six courses from the start date of your first class, though most students typically finish the certificate within 6 to 12 months.
Questions? Send them to your enrollment advisor.
MEET THE INSTRUCTOR
Todd Felker has 30 years of healthcare leadership experience. As CISO at Torrance Memorial he spent a decade building a security program. He has a proven track record of reducing organizational risk and breaking down departmental silos. As a security leader with a knack for identifying disruptive technologies, Felker was CrowdStrike’s first healthcare customer. As a healthcare executive strategist at CrowdStrike, he frequently speaks at conferences, provides threat briefings and engages with executives to review their security programs and perform platform business reviews. Felker is passionate about securing the critical infrastructure that healthcare providers are a part of and that adversaries frequently and increasingly target.
Felker earned a bachelor of science degree in computer and information systems from California State University, Dominguez Hills.
Felker holds the following certification:
- Certified Information Systems Security Professional (CISSP)
About the Center for Professional Education
Discounts | FAQs | Registration & Payment | Policies & Procedures