Insiders Threat to Business (MSc/MBA/PGD)

1st Sem : MSc/MBA/PGD in Cyber Security & IoT

Advanced 0(0 Ratings) 0 Students Enrolled
Created By TIC CIU Last Updated Wed, 16-Jan-2019 English
What Will I Learn?
  • Leading to MSc Course

Curriculum For This Course
33 Lessons 07:10:17 Hours
Introduction to Insiders Threat
2 Lessons 00:09:22 Hours
  • Insider's Threat Story 00:07:03
  • Presentation 00:02:19
  • Inside the insider threats 00:57:50
  • Insider Threat - Intentional or Unintentional 00:08:08
  • Detecting Human Indicators of Compromise 00:14:30
  • The Insider Threat is Real with Cybersecurity Expert, Derek A. Smith 00:57:47
  • Best Practices in Insider Threat Mitigation 00:39:00
  • Unauthorized Disclosure: Prevention and Reporting 00:08:31
  • Federated IT Insider Threat Awareness Training 00:05:14
  • Insider Threat Awareness and Training 00:02:31
  • Employment Background Checking Basics 00:03:24
  • Job Seekers: What to Expect from a Background Check 00:04:28
  • Hiring investigator - can end up costing companies millions 00:02:46
  • Counter Terrorism - How to Identify and Respond to Suspicious Behaviour 00:05:05
  • How to start changing an unhealthy work environment | Glenn D. Rolfsen 00:08:32
  • Six Signs You Work in a Toxic Work Environment 00:07:20
  • Cyber Security - What You Must Know To Protect Your Assets - Cyber Wealth 00:17:19
  • Protect your critical information assets before it's too late 00:13:31
  • Implement Strong Password Policies 00:01:48
  • How to Create a Strong Password 00:03:31
  • Best practices for privileged access management 00:23:01
  • Least Privilege vs. Shared Accounts 00:01:26
  • What Is the Principle of Least Privilege? 00:01:47
  • What does PRINCIPLE OF LEAST PRIVILEGE mean? 00:08:29
  • Stringent access controls and monitoring policies on privileged users 00:03:51
  • Institutionalize system change controls 00:01:22
  • Use a log correlation engine or security information and event management (SIEM) 00:34:21
  • Monitor and control remote access from all end points, including mobile devices 00:26:34
  • Develop a comprehensive employee termination procedure. 00:04:07
  • Implement secure backup and recovery processes. 00:02:45
  • Develop a formalized insider threat program 00:46:02
  • Establish a baseline of normal network device behavior 00:04:08
  • Be especially vigilant regarding social media 00:01:47
Requirements
  • Graduation
+ View More
Description
Insiders Threat to Business is one of 4 papers of MSc in Cyber Security & IoT in 1st Semester. 


You can individually complete this paper and earn TIC CIU Certified for Security Insiders
+ View More
Other Related Courses
03:37:09 Hours
0 0 $200 $150
06:56:19 Hours
Updated Wed, 16-Jan-2019
0 0 $200 $150
00:00:00 Hours
Updated Fri, 18-Jan-2019
0 0 $200 $150
About The Instructor
  • 0 Reviews
  • 1 Students
  • 17 Courses
+ View More
.
.
Student Feedback
0
Average Rating
  • 0%
  • 0%
  • 0%
  • 0%
  • 0%
Reviews
$150 $200
Buy Now
Includes:
  • 07:10:17 Hours On Demand Videos
  • 33 Lessons
  • Full Lifetime Access
  • Access On Mobile And Tv