Time
2 hours 11 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:01
okay. In conclusion, this course provided a fundamental review of the problems in solution surrounding the insider threat. This course was designed to enable you
00:13
to be able to discuss and interpret and have that basic understanding so you could communicate on the subject in an academic environment, Professor Lim Professional Environment or what? Having
00:25
the concepts and topics that we just that we discussed, including the definition of the threat, the motivating factors, the attack methods, real world attack examples, prevention in detection tools and technologies of the trade and policy and process, which is kind of
00:45
foundation of your program.
00:48
This is some suggested reading. Take a look at it if you get a chance. There are so many resource is out there. I hope you do continue your learning path on this subject. If you have any questions, comments or suggestions, this is my contact info.
01:03
I really, really do appreciate you spending a small amount of time with me
01:08
to listen to what I have to say.
01:11
I wish you the best of luck and look for my future courses on Sai Berry.
01:15
Thank you very much.
01:22
Okay, so let's do the knowledge check. So question here when elevated privileges are abused and used to steal, damaged, exposed or alter sensitive information,
01:36
This is called what
01:38
type of attack
01:45
producer attack.

Up Next

Insider Threats

This insider threat training course provides review of the “insider threat”. Discussed will be subjects related to people, tools, technology, and processes employed to prevent, detect and respond to the insider attack. This course will enable a student to confidently discuss “insider threat” concepts in a professional environment

Instructed By

Instructor Profile Image
Ross Coppage
Instructor