Insider Threat Awareness Training
This one hour course provides a basic understanding of insider threats within an organization and what employees should be aware of in their responsibilities to protect an organization's critical assets. This course explains how your work can be affected and how you can be targeted by Insider Threats.
This training is based upon the research of the CERT Insider Threat Center of the Software Engineering Institute. The CERT Insider Threat Center has been researching this problem since 2001 in partnership with the Department of Defense, the Department of Homeland Security, the U.S. Secret Service, other federal agencies, the intelligence community, private industry, academia, and the vendor community. This training is necessary for compliance with the anticipated guidelines set forth in the National Industrial Security Program Operating Manual (NISPOM) in accordance with Executive Order 13587.
Audience
- All Employees (especially those with security clearance)
- Senior Executives
- Insider Threat Program Team Members
- Insider Threat Program Managers
- Contractors and Subcontractors
- Suppliers and Business Partners
Objectives
At the completion of the course, learners will be able to:
- Define an Insider and threats they impose to critical assets
- Recall common motivations of Malicious Insiders
- Name different types of Insider Threats
- Recognize how you can become an Unintentional Insider Threat
- Discuss impacts to your organization, the general public and national security
- Describe the consequences of being a Malicious or Unintentional Insider
- Understand how you can be targeted by a malicious individual as well as external adversaries
- Identify reportable behaviors of Malicious Insiders threats
- Identify steps you can take to protect yourself
- Be aware of actions to take if you see or suspect an Insider Threat
- Recognize resources available to you in your organization
Topics
This online course contains one hour of narrated instructional content and includes questions to confirm and reinforce your understanding of the concepts presented. Actual cases are used to demonstrate Insider Threat risk, activity, and consequence. The topics you will study are:
- Insider Threat - It may not be what you think
- What is an Insider Threat and how it affects you
- Types of Insider Threats
- Impacts of being an Insider Threat
- How to protect yourself and your organization
Learners will have one year to complete the course. Upon completing all course elements, the learner is awarded an electronic certificate of course completion.
Materials
This course is presented in the form of video instruction presented by experts from the CERT Insider Threat Center. Self-assessments following each topic presented assist with comprehension of the subject matter. Learners will also be able to access additional resources related to the subject matter and a downloadable copy of the course presentation slides.
Prerequisites
This course has no prerequisites.
To access the SEI Learning Portal, your computer must have the following:
- For optimum viewing, we recommend using the following browsers: Microsoft Edge, Mozilla Firefox, Google Chrome, Safari
- These browsers are supported on the following operating systems: Microsoft Windows 8 (or higher), OSX (Last two major releases), Most Linux Distributions
- Mobile Operating Systems: iOS 9, Android 6.0
- Microsoft Edge, Firefox, Chrome and Safari follow a continuous release policy that makes difficult to fix a minimum version. For this reason, following the market recommendation we will support the last 2 major version of each of these browsers. Please note that as of January 2018, we do not support Safari on Windows.
This is an eLearning course
IMPORTANT NOTICE:
Carnegie Mellon University/Software Engineering Institute offices will be closed for winter break, December 21, 2024-January 1, 2025. SEI course registrations received during this period will be confirmed and enrollment completed upon our return on January 2, 2025.
Course Questions?
Email: | course-info@sei.cmu.edu |
Phone: | 412-268-7388 |
Related Courses
Building an Insider Threat Program
ONLINE • Insider Threat
This 7-hour online course provides a thorough understanding of insider threat program organizational models, essential components for effectiveness, key stakeholder involvement, and basic implementation guidance.
Learn MoreOverview of Insider Threat Concepts and Activities
ONLINE • Insider Threat, Enterprise Risk and Resilience Management
This 3-hour online course provides a thorough understanding of insider threat terminology, identifies different types of insider threats, teaches how to recognize both technical and behavioral indicators, and outlines mitigation strategies.
Learn MoreInsider Threat Program Manager: Implementation and Operation
Insider Threat, Cyber Workforce Development
This 3-day course builds upon the foundational concepts presented in the prerequisite courses, Overview of Insider Threat Concepts and Activities and Building an Insider Threat Program, by delivering a process roadmap to building various parts of a robust Insider Threat Program.
Learn MoreTraining courses provided by the SEI are not academic courses for academic credit toward a degree. Any certificates provided are evidence of the completion of the courses and are not official academic credentials. For more information about SEI training courses, see Registration Terms and Conditions and Confidentiality of Course Records.