Foundations of Insider Threat Management ED520.10
Description: This course is designed to introduce students to the risks posed by trusted insiders, including the psychological motivations, predispositions, and behaviors associated with this group. Students will explore the historical context of insider threat and the counter insider threat mission, to include relevant law, policy, and regulation. Students will be challenged to apply critical thinking skills to address current issues surrounding this problem set, including privacy and civil liberties concerns, cyber insider threat, and active shooter/workplace violence. Students will contextualize these issues within their major area of study to identify the role of their discipline in preventing and countering the insider threat. This course was developed in partnership with the Office of the Under Secretary of Defense for Intelligence and Security and National Insider Threat Task Force.
Course Learning Objectives: This course is designed to enable students to:
- Assess risks posed by trusted insiders and specific psychological factors that contribute to risk.
- Evaluate the historical context for insider threat and the impact of political and socioeconomic factors on threat behavior and incident response.
- Critique current policies and programs designed to counter the insider threat and relate multi-disciplinary risk mitigation actions to their field of study.
- Differentiate government and private sector insider threat response.
- Evaluate specific problem sets related to privacy and civil liberties concerns, cyber insider threat, and acts of violence.
- Appraise the current state of social and behavioral science research into insider threat and propose future areas of research to address insider threats.
Delivery Method: Virtual Instructor-led
Length: 16 weeks
Target Audience: US military members and civilian government employees.
Clearance Requirement: None
Number of Students per Course: 20
Requirements: This course requires students to complete weekly assignments, including reading, research and writing assignments similar to those required for a three semester hour graduate-level course. Students must make significant commitment of time to complete assignments.
System Requirements: Check if your system is configured appropriately to use STEPP.
Credit Recommendation (What's this?): 3 semester hours in information security or cyber security - graduate degree category.
User Notes: This course requires students to complete weekly assignments including reading, research and writing assignments similar to those required for a three semester hour college or graduate-level course. Students must make a significant commitment of time to complete these assignments.
CDSE courses are intended for use by Department of Defense and other U.S. Government personnel and contractors within the National Industrial Security Program.