Checkpoint Learning

Course Detail

Insider Threats - What Every Business Organization Should Know and Do   Updated

CATEGORY: Specialized Knowledge & Applications
COURSE ID: CLINSD, VERSION 2.00
(81)
Online & Mobile, Download
1 CPE Credits
Level: Basic

It is of critical importance for an entity to examine how an inside threat could harm an organization, both in the short term and extending into the future. Who in the entity has access to sensitive data that, if exposed or lost, could significantly disrupt or harm the organization's healthy operations? The potential population of insiders who may threaten the viability of a business can be quite extensive. Historically, insider threats were attributable to owners, executives, and management that violated company policy due to greed or power. This group of people had access but abused their authority. As the Internet and eCommerce became widely adopted for business, insider threats have been replaced with unauthorized insider access. In this course, we will examine history to identify the different types of insider threats to an organization.

Add to Cart         Preview
/

Accreditation Information

Learning objectives

Course outline

Requirements