10% OFF Insider Threats & Countermeasures

  • Introduction of Facilitator
  • Thematic Areas
  • Who is an Insider?
  • Types of Insiders
  • How Insider Recruitment Scams Work
  • Identifying an Insider
  • Video Demonstration
GHC15
GHC13.50
ADD TO CART
Category Financial Crimes
Price GHC13.50
Duration 0:35:00
Description

Traditional safety efforts usually focus on external threats and are not generally equipped for recognizing internal threats arising from within an organization. Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business.


The course is designed to educate participants on insider threats, how to identify them and implement controls to reduce the risk that arise from such threats.

What You Will Learn

This programme is designed to:

  1. Shed light on who an insider is.
  2. Describe how insider recruitment happens.
  3. Highlight methods to help identify insiders within an organization.
  4. Introduce controls to address the issue of insider threats
Requirements

There are no special requirements for this course. However, to partake in this course, participants must have the following:

·      A good internet connection

·      Laptop / Desktop/Mobile Devices

·      Basic Knowledge in Computing

You Might Also Like

10% OFF

Internet of Things …

Accord…

GHC13.50
15
60% OFF

Cyber Security Esse…

Cybera…

GHC140.00
350
10% OFF

Introduction to Cyb…

Today’…

GHC13.50
15
10% OFF

C)DFE: Certified Di…

The Ce…

GHC2610.00
2900
0% OFF

C)PEH: Certified Pr…

To pro…

GHC2500
2500