View Class Schedule 
► ProgramsCyber Insider Threat

Cyber Insider Threat

Overview

Cyber technology advances have changed the world and the benefits to individuals, private industry, and nation states are expanding on a daily basis. However, cyber technology creates unique vulnerabilities for both private and public sector users. Cyber threats to individual privacy, global commerce, and national security are as rampant as they are diverse, dynamic and complex. Cybersecurity seeks to meet this challenge by developing technical measures to detect and deter adversary activity.  Unfortunately, many cyber threats – particularly cyber insider threats - cannot be countered by technical defenses alone. The Wikileaks release of U.S. diplomatic cables, the Snowden disclosures, the conviction of former University of Tennessee Professor John Reece Roth for the illegal export of military research data, and the arrest of Jin Hanjuan for theft of Motorola trade secrets, are high profile examples of the crisis faced by cybersecurity professionals. Insider threat in particular is often difficult to detect and requires integrated solutions that take into account legal, economic, political, behavioral and social disciplines. 
 
The Cyber Insider Threat course provides a means to leverage counterintelligence and operation security practices to combat the insider threat. This course provides counterintelligence, competitive intelligence, and security awareness for cybersecurity professionals in both government and private industry. Students will be provided an overview of the intelligence community and an introduction to counterintelligence. The course identifies threats to national security and private industry interests from foreign collectors, insiders, and various traditional and non-traditional sources. Students are introduced to counterintelligence and law enforcement agencies with cybersecurity or cyber-counterintelligence missions and given tools and techniques for building effective relationships within those communities. The course provides an in depth review of operations security practices to identify threats and vulnerabilities, assess risk, and employ countermeasures. The course helps students understand the requirements for and value of reporting cyber incident information.

Objectives

At the end of this course, students will gain an understanding of the full spectrum of insider threats, including current and former employees, contractors, business partners, vendors, and suppliers.  Students will be able to identify integrated physical, technical, and low cost common sense security measures in order to detect, deter and neutralize the threat.  Students will differentiate between traditional espionage, economic espionage, trade secret theft, and related crimes and identify activities and behaviors indicative of illicit activity. Students will learn about the roles and responsibilities of cybersecurity professionals in preventing, detecting, and reporting illicit activity.  Students will learn to harness federal resources available to them and develop skills required to safeguard information systems at their organizations. 

Topics

  • Cyber CI 101
  • Cyber Insider Threat
  • Operations Security for the IT Professional
  • Working with Law Enforcement, Security and Counterintelligence
  • Incident Reporting

Prerequisites

One year of IT work experience.

Schedule

1 day

Group Training Available

UMBC Training Centers can deliver any of our courses in a group training environment at our facilities or yours. Group training can be an effective and economical method to quickly assure competency and consistency of knowledge and skills within an organization or department.