Teramind Academy

Learning Path
Insider Threat Detection Course - Teramind Certification
Insider Threat Detection Course - Teramind Certification

About This Learning Path

This certification course will walk through tools and techniques you can use to help spot and prevent risky behaviors for Insider Threat use cases. It includes information on how to set up Rules and Policies to track potentially concerning and malicious activities in order to keep your data safe, how to use Teramind's OMNI and the Employees Page Reports for quick investigations into outlier behaviors, how to customize your Monitoring Settings, use BI Reports to proactively determine risky behaviors and more. Upon completion of this course, you will receive a shareable Teramind Certificate. Est. completion time: 2 hours, 15 min 

How to Use Rules and Policies for Insider Threat Detection
How to Use Rules and Policies for Insider Threat Detection
How to Use the OMNI Page and Employee Reports for Investigations
How to Use the OMNI Page and Employee Reports for Investigations
How to Set Up and Customize Your Monitoring Settings
How to Set Up and Customize Your Monitoring Settings
How to Use OCR and BI Reports for Investigations and Trend Analysis
How to Use OCR and BI Reports for Investigations and Trend Analysis
How to Maintain Security with Access Controls and the System Tab Reports
How to Maintain Security with Access Controls and the System Tab Reports
Insider Threat Detection Certification Course Final Knowledge Check
Insider Threat Detection Certification Course Final Knowledge Check

Teramind Insider Threat Detection Course Certification

Learning Path
Insider Threat Detection Course - Teramind Certification
Insider Threat Detection Course - Teramind Certification

About This Learning Path

This certification course will walk through tools and techniques you can use to help spot and prevent risky behaviors for Insider Threat use cases. It includes information on how to set up Rules and Policies to track potentially concerning and malicious activities in order to keep your data safe, how to use Teramind's OMNI and the Employees Page Reports for quick investigations into outlier behaviors, how to customize your Monitoring Settings, use BI Reports to proactively determine risky behaviors and more. Upon completion of this course, you will receive a shareable Teramind Certificate. Est. completion time: 2 hours, 15 min 

How to Use Rules and Policies for Insider Threat Detection
How to Use Rules and Policies for Insider Threat Detection
How to Use the OMNI Page and Employee Reports for Investigations
How to Use the OMNI Page and Employee Reports for Investigations
How to Set Up and Customize Your Monitoring Settings
How to Set Up and Customize Your Monitoring Settings
How to Use OCR and BI Reports for Investigations and Trend Analysis
How to Use OCR and BI Reports for Investigations and Trend Analysis
How to Maintain Security with Access Controls and the System Tab Reports
How to Maintain Security with Access Controls and the System Tab Reports
Insider Threat Detection Certification Course Final Knowledge Check
Insider Threat Detection Certification Course Final Knowledge Check

Teramind Insider Threat Detection Course Certification

Northpass logo Powered by Northpass