Course Description (from the course website)
What you’ll learn
-
Explore the common and not-so-common insider threats to your organization’s information security.
-
Identify the most common insider cyber-perpetrators.
-
Identify the red flags of potential or actual insider cyber-crime.
-
Explore how to detect and initiate an investigation of suspected insider cyber-crime.