Protecting Against Insider Threats
VividCloud

Course Objectives
At the end of this course, the participants will be able to:
- Describe the threat that malicious insiders pose to critical infrastructure.
- Identify common characteristics and indicators associated with malicious insiders.
- Identify actions that can be taken against insider threats.