Skip to main content

Protecting Against Insider Threats


VividCloud

Course Objectives

At the end of this course, the participants will be able to:

  • Describe the threat that malicious insiders pose to critical infrastructure.
  • Identify common characteristics and indicators associated with malicious insiders.
  • Identify actions that can be taken against insider threats.
Enroll