+ 1 CPE FREE ON-DEMAND VIDEO COURSE

The Enemy Within: Understanding Insider Threats

Troy Hunt, Microsoft Regional Director, Creator of HaveIBeenPwned

Most data breaches start with an insider. This course gives you an in-depth look at where insider threats originate from, which assets they target, and defensive measures that can detect and prevent insiders from exfiltrating data. 💀

Thank you for registering!
Thank you for registering for our CPE Course. You should receive an automated email to access the course in the next few minutes. Please contact us if you have any issues at all.

About this course

During this 8-part video course, Troy will walk you through where insider threats come from, the assets they typically target, and most crucially how you can defend your organisation against them. 

Looking for CPE credits? Complete and submit this form once you finish the course for a proof-of-completion certificate.

Please note, this course was published in 2016. Stay tuned for new CPE course content coming soon!

What you'll learn:

  • Understand where insider threats originate from
  • Identify and secure the assets under threat
  • How to defend against insider threats 

Course instructor

TroyHunt

Troy Hunt

Microsoft Regional Director, Creator of HaveIBeenPwned

Who is the course for?

  • CISO/CTO
  • IT Pros / DevOps
  • System Administrators
  • Security Auditors
  • Anyone involved in data security
computer-01-Ransomware

What other people are saying about this course

Unlock the full course

Register now to access the full course on-demand