Insider Threats

Intermediate

Insider Threats

Overview
Curriculum

Employees, contractors, and trusted vendors can all pose insider risks. This course will help you recognize the signs of negligent or malicious insiders and understand how to protect sensitive information from within.
You’ll Learn:

Different types of insider threats and their motivations

Behavioral red flags to watch for

How to report and respond to suspicious activity

Curriculum

  • 1 Section
  • 10 Lessons
  • 2 Quizzes
  • 1h 50m Duration
Collapse All
Course
10 Lessons2 Quizzes
  1. Lesson 1: Understanding Insider Threats
  2. Lesson 2: Common Behaviours of Malicious Insiders
  3. Lesson 3: Case Studies: Real-World Insider Breaches
  4. Lesson 4: Insider Threats vs. External Threats
  5. Lesson 5: Risks from Third-Party Access
  6. Q&A
  7. Lesson 6: Tools for Monitoring and Detection
  8. Lesson 7: Reporting Suspicious Activity Internally
  9. Lesson 8: Building a Culture of Trust and Accountability
  10. Lesson 9: Onboarding and Offboarding Best Practices
  11. Lesson 10: Responding to an Insider Threat Incident
  12. Q&A

Deleting Course Review

Are you sure? You can't restore this back

Course Access

This course is password protected. To access it please enter your password below:

Scroll to top