Course 124: Mitigating insider threats


This course will focus on applicable technical safeguards to insider threats, recognizing that is it not easy to secure completely. There are several technical safeguards to leverage: separation of duties, personnel rotation, privilege and permission management, two-person integrity, complete mediation of activities, and monitoring and surveillance. The course will present how and why these controls can help to mitigate, detect, and investigate insider wrongdoing.


  • Identify insider threats and the motivations behind them
  • Distinguish between types of insider threats
  • Describe tactics, techniques and procedures used in insider threats
  • Apply security controls and countermeasures to mitigate insider threat

Target audience

IT practitioners, IT decision makers, and other technical/security personnel interested in learning more about insider threats.

Report a problem on this page

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Please select all that apply:

Thank you for your help!

You will not receive a reply. For enquiries, please contact us.

Date modified: