Insider Threat Detection & Automation by Behaviour Analytics
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore insider threat detection and automation through behavior analytics in this 23-minute OWASP Foundation talk. Delve into the importance of insider threat detection, types of insiders, and User and Entity Behavior Analytics (UEBA). Learn about anomalies, volumetric analysis, and statistics in threat detection. Discover use cases, including identity theft, and examine models, data analytics, and technology used in this field. Gain valuable insights from a case study and a comprehensive overview of insider threat detection strategies.
Syllabus
Introduction
About Hima
Disclaimer
Case Study
What is Insider Threat Detection
Why Insider Threat Detection
Types of Insiders
What is UEBA
Anomalies
Volumetric Analysis
Statistics
Use Cases
Identity Theft
Models
Data Analytics
Technology
Summary
Taught by
OWASP Foundation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network