Learning path

Rubrik Cyber Recovery

Skill Level
Intermediate
Duration 40 minutes
Updated Oct 23, 2024

About this learning path

With cyberattacks increasing in frequency and sophistication, organizations face new challenges in protecting data. Legacy backup tools are more vulnerable than ever as attackers increasingly target backup data as part of their attacks. With Rubrik's comprehensive, modern solution to secure your data wherever it lives, organizations can be confident in their ability to recover from an attack while proactively gaining insight into threats and sensitive data.

Your instructors

Prerequisites

  1. Knowledge of Rubrik Data Protection
  2. Completion of Rubrik Cyber Recovery Fundamentals Learning Path
  3. An interest in learning more about how Rubrik defends and protects against ransomware

What you'll learn

  1. How Artificial Intelligence (AI) and Machine Learning (ML) are impacting both the attackers and the defenders from a ransomware perspective.
  2. Overview of Rubrik's Immutable Architecture
  3. How Rubrik Threat Hunting can proactively identify threats in your environment
  4. How Rubrik Orchestrated Application Recovery features help recover quickly and efficiently
  5. How Rubrik Sensitive Data Monitoring helps identify what data lives where within your environment

Technologies

Learning path
Collapse all
Rubrik Cyber Recovery
  1. 1. Introduction
    1. Enroll in this learning path to view locked contentPreparing for Ransomware in the Age of Generative AI
      Article
      Locked
    2. Enroll in this learning path to view locked contentHow Machine Learning and Generative AI will Affect Data Protection in 2024 and Beyond
      Article
      Locked
    3. Enroll in this learning path to view locked contentWhat Is Cyber Recovery as a Service?
      Article
      Locked
  2. 2. Rubrik Cyber Recovery
    1. Enroll in this learning path to view locked contentIn Depth With Rubrik's Immutable Backup Architecture
      Article
      Locked
    2. Enroll in this learning path to view locked contentRubrik Threat Hunting - A Technical Overview
      Article
      Locked
    3. Enroll in this learning path to view locked contentRubrik Orchestrated Application Recovery - Automating Recovery To Minimize Downtime
      Article
      Locked
    4. Enroll in this learning path to view locked contentRubrik Sensitive Data Monitoring Overview
      Video
      Locked
  3. 3. Conclusion
    1. Enroll in this learning path to view locked contentQuiz
      Quiz
      Locked
    2. Enroll in this learning path to view locked contentLearning Path Complete
      Achievement Badge
      Locked