Companies have enough to worry about from outsiders when it comes to cybersecurity. From clever hackers infiltrating their networks to criminal gangs stealing their data and government surveillance of their systems, security teams have to be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.

According to the 2015 Insider Threat Spotlight Report, 62 percent of security professionals are seeing a rise in insider attacks.  While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.

This course discusses the most current and dangerous insider cybersecurity threats and outlines measures for preventing and investigating insider data theft, industrial espionage, cyber-sabotage, identity theft and more.

The course covers:

  • Types of insider threats and most common perpetrators
  • Red flags of internal data theft, cyber-sabotage, identity theft and espionage to watch for
  • Latest best practices in information security
  • Insider data theft investigation essentials
Learning Objectives
  • Explore the common and not-so-common insider threats to your organization’s information security
  • Identify the most common insider cyber-perpetrators
  • Identify the red flags of potential or actual insider cyber-crime
  • Explore how to detect and initiate an investigation of suspected insider cyber-crime

 

Last updated/reviewed: March 10, 2024
26 Reviews (129 ratings)

Reviews

4
Member's Profile
The course provided a good overview of the topic. I found it lacking in discussing some of the applications that might be used to help mitigate the threat such as Privileged Access Management System, Data Loss Prevention (DLP), and specific tools now available to detect suspicious insider activity.

4
Anonymous Author
This course was informative and the exam followed the talking points very closely. I appreciated that the exam covered the information provided in the course rather than drawing on outside points or references. I enjoyed the instructor drawing on his own experiences/news stories.

4
Anonymous Author
This is a horrible speaker. I looked at his biography and noted that his website it inactive. You may want an instructor who is more current than this instructor. I recommend someone else who is a better speaker and who can update this course and add current case studies.

5
Member's Profile
Great course! What surprised me was that apart from hackers, the next highest percentage of cyber fraud was committed by employees (i.e., known and unknown). All employees can benefit from this course given that pressure can come at any time.

4
Anonymous Author
The discussions on who the likely perpetrators of cyber crime and on red flags of insider information attacks added additional insight to the slides.

5
Anonymous Author
.....................................................................................................................................................

5
Anonymous Author
important topic to consider since usually companies concentrate on outside threats, whhen an insider is left alone. Good presentation on the topic.

5
Member's Profile
This is great. I enjoyed the lecture. There were also good examples for each topic that was discussed. I thought the processor spoke well.

4
Member's Profile
Slides are brief and simple to read, the presenter does talk straight to the point and make it easier to absorb.

4
Anonymous Author
This is more of a refresher course on cyber security. Nothing surprised me. This will be beneficial to beginners.

5
Anonymous Author
Very comprehensive and helpful course. I am very happy to take the course it is really informative and worth.

5
Anonymous Author
Peter did a nice job of concisely stating the material in an easy to understand way. Thanks, Peter!

5
Anonymous Author
Program materials were relevant and contributed to the achievement of the learning objectives.

4
Anonymous Author
Good course coverage, but some of the data taken for exemplification are not current ones.

5
Member's Profile
nice coverage on relevant topics. This is a brief and short description of my review.

5
Anonymous Author
The course was easy to follow and understand along with the case studies presented.

5
Anonymous Author
Well structured and easy to follow. Practical examples and relatable case studies.

5
Anonymous Author
This was an informative course and highlights key things to be always mindful of.

5
Anonymous Author
A very good overview of the topic presented in a clear manner with good examples.

4
Anonymous Author
This was an interesting course understanding cyber threats in general

2
Member's Profile
material needs significant revision ... did not like the course

4
Anonymous Author
This was a very detailed course, good information provided.

4
Anonymous Author
The course provided good insights on internal cyber-crime

5
Anonymous Author
Very informative and well structured course. Good Job.

Member's Profile
Like the focus on Fraud and Security

5
Member's Profile
Good training.

Prerequisites
Course Complexity: Intermediate

No Advanced Preparation or Prerequisites are needed for this course. 

Education Provider Information
Company: Illumeo, Inc., 75 East Santa Clara St., Suite 1215, San Jose, CA 95113
Contact: For more information regarding this course, including complaint and cancellation policies, please contact our offices at (408) 400- 3993 or send an e-mail to .
Instructor for this course
Course Syllabus
INTRODUCTION AND OVERVIEW
  Introduction to Growing Internal Cyber-Threats and How to Protect Against Them5:09
Internal Cyber-Threats
  Common Cyber - Perpetrators 8:15
  Internal Cyber-Threats to Organizations 11:28
  Internal Cyber-Threats 212:55
  Red Flags of Insider Information Attacks 12:19
Best Practices
  Best Practices InfoSec Controls 11:10
  Best Practices InfoSec Controls (Continued)10:33
CONCLUSION
  Investigation and Detection Best Practices 9:53
Continuous Play
  Inside Job: The Growing Internal Cyber-Threats and How to Protect Against Them 1:21:43
SUPPORTING MATERIALS
  Slides: Inside JobPDF
  Inside Job Glossary/IndexPDF
REVIEW and TEST
  REVIEW QUESTIONSquiz
 FINAL EXAMexam