0% OFF Insider Threats & Countermeasures

  • Introduction of Facilitator
  • Thematic Areas
  • Who is an Insider?
  • Types of Insiders
  • How Insider Recruitment Scams Work
  • Identifying an Insider
  • Video Demonstration
GHC36
GHC36
ADD TO CART
Category Financial Crimes
Price GHC36
Duration 0:35:00
Description

Traditional safety efforts usually focus on external threats and are not generally equipped for recognizing internal threats arising from within an organization. Insider threats are users with legitimate access to company assets who use that access, whether maliciously or unintentionally, to cause harm to the business.


The course is designed to educate participants on insider threats, how to identify them and implement controls to reduce the risk that arise from such threats.

What You Will Learn

This programme is designed to:

  1. Shed light on who an insider is.
  2. Describe how insider recruitment happens.
  3. Highlight methods to help identify insiders within an organization.
  4. Introduce controls to address the issue of insider threats
Requirements

There are no special requirements for this course. However, to partake in this course, participants must have the following:

·      A good internet connection

·      Laptop / Desktop/Mobile Devices

·      Basic Knowledge in Computing

You Might Also Like

0% OFF

C)PEH: Certified Pr…

To pro…

GHC3100
3100
0% OFF

Insider Threats & C…

Tradit…

GHC36
36
0% OFF

Social Engineering …

A grow…

GHC36
36
0% OFF

Financial Fraud & C…


GHC1788.75
1788.75
0% OFF

C)NFE: Certified Ne…

The Ce…

GHC3100
3100
0% OFF

Affiliates Programme

This p…

GHC1000
1000