Insider Threat Detection & Automation by Behaviour Analytics
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore insider threat detection and automation through behavior analytics in this 23-minute OWASP Foundation talk. Delve into the importance of insider threat detection, types of insiders, and User and Entity Behavior Analytics (UEBA). Learn about anomalies, volumetric analysis, and statistics in threat detection. Discover use cases, including identity theft, and examine models, data analytics, and technology used in this field. Gain valuable insights from a case study and a comprehensive overview of insider threat detection strategies.
Syllabus
Introduction
About Hima
Disclaimer
Case Study
What is Insider Threat Detection
Why Insider Threat Detection
Types of Insiders
What is UEBA
Anomalies
Volumetric Analysis
Statistics
Use Cases
Identity Theft
Models
Data Analytics
Technology
Summary
Taught by
OWASP Foundation
Related Courses
Privacy and Security in Online Social MediaIndian Institute of Technology Delhi via Swayam Cybersecurity Awareness: Phishing and Whaling
LinkedIn Learning Cybersecurity for Executives
LinkedIn Learning Avoiding Phishing Scams
LinkedIn Learning Threat Modeling: Repudiation in Depth
LinkedIn Learning