The Enemy Within: Understanding Insider Threats
Most data breaches start with an insider. This course gives you an in-depth look at where insider threats originate from, which assets they target, and defensive measures that can detect and prevent insiders from exfiltrating data. đź’€
Thank you for registering!
About this course
During this 8-part video course, Troy will walk you through where insider threats come from, the assets they typically target, and most crucially how you can defend your organisation against them.
Looking for CPE credits? Complete and submit this form once you finish the course for a proof-of-completion certificate.
Please note, this course was published in 2016. Stay tuned for new CPE course content coming soon!
What you'll learn:
- Understand where insider threats originate from
- Identify and secure the assets under threat
- How to defend against insider threats
Course instructor
Troy Hunt
Microsoft Regional Director, Creator of HaveIBeenPwned
Who is the course for?
- CISO/CTO
- IT Pros / DevOps
- System Administrators
- Security Auditors
- Anyone involved in data security
What other people are saying about this course
"Troy delivers this with an engaging style and mixes a deep understanding of the theory with relevant hands-on learning exercises."
"Troy has shown us just how shockingly easy some vulnerabilities are to exploit."
"The content was easy to digest and has greatly improved our security knowledge"
"Troy delivers this with an engaging style and mixes a deep understanding of the theory with relevant hands-on learning exercises."
"Troy has shown us just how shockingly easy some vulnerabilities are to exploit."
"The content was easy to digest and has greatly improved our security knowledge"
"Troy delivers this with an engaging style and mixes a deep understanding of the theory with relevant hands-on learning exercises."
"Troy has shown us just how shockingly easy some vulnerabilities are to exploit."
"The content was easy to digest and has greatly improved our security knowledge"
"Troy delivers this with an engaging style and mixes a deep understanding of the theory with relevant hands-on learning exercises."
"Troy has shown us just how shockingly easy some vulnerabilities are to exploit."
"The content was easy to digest and has greatly improved our security knowledge"