Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

Pluralsight

Cybersecurity Threats: Insider Threats

via Pluralsight

Overview

Insider threats are in the top ten threats facing organizations today. Learn to detect insider threats and how to deploy countermeasures to protect against them.

Insider threats are growing and the impact from often over-looked insider threats can threaten organizations. You need to be on the lookout for an increasing number of accidental breaches by employees storing confidential data on unsecure cloud storage. In this course, Cybersecurity Threats: Insider Threats, you'll learn how serious the risk is from insiders, how insiders can threaten an organization, and how to protect against them. First, you'll explore how to detect both a malicious and an accidental insider threat. Next, you'll discover how to respond and contain an insider incident. Finally, you'll learn the best practices and countermeasures you can deploy to help protect your organization from insider threats. By the end of this course, you'll have learned how to approach the insider threat, and be able to prepare your insider threat plan, including detection, containment, and prevention measures to protect your organization.

Syllabus

  • Course Overview 1min
  • What Is an Insider Threat? 17mins
  • Who Are the Insiders and What Are Their Motives? 27mins
  • Incident Response: Detecting the Insider Threat 36mins
  • Incident Response: Containment and Recovery 16mins
  • Countermeasures and Best Practices 23mins

Taught by

Richard Harpur

Reviews

4.8 rating at Pluralsight based on 24 ratings

Start your review of Cybersecurity Threats: Insider Threats

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.