This course provides guidance to critical infrastructure employees and service providers on how to identify and take action against insider threats to critical infrastructure.
- Describe the threat that malicious insiders pose to critical infrastructure
- Identify common characteristics and indicators associated with malicious insiders
- Identify actions that can be taken against insider threats
If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.