Unlock this free course now

Watch three lessons below right now. Then register to unlock the rest.

Lessons

  Topic Time
 
1. Introduction 7:26
 
2. Where Insider Threats Originate From 4:48
 
3. Assets Targeted by Insiders 10:19
 
4. The Threat of Malicious Insiders 9:00
 
5. The Risk of Unintentional Insiders 8:25
 
6. How Insiders Exfiltrate Data 7:45
 
7. Defensive Measures 11:52
 
8. Summary 3:01

About the author

TroyHunt

Troy is a Pluralsight author, Microsoft MVP, and world-renowned internet security specialist. He’s also the creator of “Have I been pwned?”, the free online service for breach monitoring and notifications.

Read more...

Level: Beginner

Duration: 1h 3m

Did you like the course? Tweet it!