Intermediate
Insider Threats
- 1 Section
- 10 Lessons
- 2 Quizzes
- 1h 50m Duration
Course
10 Lessons2 Quizzes
- Lesson 1: Understanding Insider Threats
- Lesson 2: Common Behaviours of Malicious Insiders
- Lesson 3: Case Studies: Real-World Insider Breaches
- Lesson 4: Insider Threats vs. External Threats
- Lesson 5: Risks from Third-Party Access
- Q&A
- Lesson 6: Tools for Monitoring and Detection
- Lesson 7: Reporting Suspicious Activity Internally
- Lesson 8: Building a Culture of Trust and Accountability
- Lesson 9: Onboarding and Offboarding Best Practices
- Lesson 10: Responding to an Insider Threat Incident
- Q&A
Employees, contractors, and trusted vendors can all pose insider risks. This course will help you recognize the signs of negligent or malicious insiders and understand how to protect sensitive information from within.
You’ll Learn:
Different types of insider threats and their motivations
Behavioral red flags to watch for
How to report and respond to suspicious activity
