Instructor for this course
more

Companies have enough to worry about from outsiders when it comes to cybersecurity. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.

According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks.  While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.

This course discusses the most current and dangerous insider cybersecurity threats and outlines measures for preventing and investigating insider data theft, industrial espionage, cyber-sabotage, identity theft and more.

The course covers:

  • Types of insider threats and most common perpetrators
  • Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
  • Latest best practices in information security
  • Insider data theft investigation essentials

Learning Objectives

  • Explore the common and not-so-common insider threats to your organization’s information security
  • Identify the most common insider cyber-perpetrators
  • Identify the red flags of potential or actual insider cyber-crime
  • Explore how to detect and initiate an investigation of suspected insider cyber-crime

 

Last updated/reviewed: April 20, 2018

6 Reviews (26 ratings)Reviews

5
Member's Profile
Great course! What surprised me was that apart from hackers, the next highest percentage of cyber fraud was committed by employees (i.e., known and unknown). All employees can benefit from this course given that pressure can come at any time.
4
Anonymous Author
The discussions on who the likely perpetrators of cyber crime and on red flags of insider information attacks added additional insight to the slides.
4
Member's Profile
Slides are brief and simple to read, the presenter does talk straight to the point and make it easier to absorb.
2
Member's Profile
material needs significant revision ... did not like the course
Member's Profile
Like the focus on Fraud and Security
5
Member's Profile
Good training.

Prerequisites

Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. 

Education Provider Information

Company:
Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact:
For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Course Syllabus
INTRODUCTION AND OVERVIEW
  5:09Introduction to Growing Internal Cyber-Threats and How to Protect Against Them
Internal Cyber-Threats
  8:15Common Cyber - Perpetrators
  11:28Internal Cyber-Threats to Organizations
  12:55Internal Cyber-Threats 2
  12:19Red Flags of Insider Information Attacks
Best Practices
  11:10Best Practices InfoSec Controls
  10:33Best Practices InfoSec Controls (Continued)
CONCLUSION
  9:53Investigation and Detection Best Practices
Continuous Play
  1:21:43Inside Job: The Growing Internal Cyber-Threats and How to Protect Against Them
SUPPORTING MATERIALS
  PDFSlides: Inside Job
  PDFInside Job Glossary/Index
REVIEW and TEST
  quizREVIEW QUESTIONS
 examFINAL EXAM