This scenario-based online course introduces the insider threat and presents methods for investigation and analysis. The course defines insider threat and explains the motivations, behavior indicators, tactics and techniques associated with threat activity in the cyber domain. Students explore technical and administrative resources used to identify and investigate insider-threat activity.
Explain the motivations of the trusted-insider turned-adversary
Distinguish between various tactics, techniques and procedures of the insider threat in cyberspace
Summarize examples of the insider threat
Outline methods used to investigate the insider threat
Restate examples of resources that assist in identifying and investigating the insider threat in cyberspace
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.