Course Content

Course Description

From key concepts like insider triggers to the importance of workflows, here is how you can protect your organization from the inside out.

Instructed By

Instructor Profile Image
Alex Matheson
Instructor

Delivered By

Code42

Code42 Insider Threat Software delivers a faster, simpler, more comprehensive path to data loss detection, investigation and response.

Provided By

Cybrary

Certificate of Completion

Certificate Of Completion

Complete this entire course to earn a 8 Steps to Building a Modern Insider Threat Program Certificate of Completion