Course curriculum

  • 1

    Chapter One: Introduction to the course

  • 2

    Chapter Two: Personality assessment

    • Introduction to personality assessment

    • Chapter two assessment

  • 3

    Chapter Three: Psychology of the insider threat

    • An individuals perception / context of the world around them

    • The ABC's of the insider threat

    • Chapter three assessment

  • 4

    Chapter Four: The unwitting insider threat

    • Social engineering

    • Phishing e-mail example

    • Chapter four assessment

  • 5

    Chapter Five: Mitigation through leadership and baseline behaviors

    • Six signs to predictable behavior and baseline behavioral observations

    • Chapter five assessment

  • 6

    Conclusion and next steps

    • Conclusion

    • More resources for you

    • Before you go...