Breach from Within: Introduction to Insider Risk and Threats examines one of today’s most complex security challenges: the threat that originates from trusted insiders. While many security programs focus on external attacks, this course shifts attention to the human, behavioral, and organizational factors that drive insider incidents.

Breach From Within: Introduction to Insider Risk and Threats
Limited time! Save 40% on 3 months of Coursera Plus and full access to thousands of courses.

Recommended experience
What you'll learn
The nuances of insider risk and insider threat
The implications within a broader security context
How organizations can foster organizational security
Risk-based approaches to insider risk management and insider threat mitigation
Details to know

Add to your LinkedIn profile
March 2026
5 assignments
See how employees at top companies are mastering in-demand skills

There are 6 modules in this course
Welcome to the introductory module for the course, "Breach from Within: Introduction to Insider Risk and Threats." You will notice that this course is designed a bit differently than many other Coursera courses. In this module, you will first learn how to navigate this new interface. Then you will apply those navigation skills, in order to review the course goals and objectives.
What's included
1 video1 plugin
This module lays the groundwork for understanding insider risk. It begins by defining “insider risk” and distinguishing it from the narrower term “insider threat.” It will also touch on the overlap with targeted violence and how insider threats can escalate into workplace violence. This module also explores the high frequency of insider incidents and stresses the necessity of a proactive approach to managing them. To put this issue into perspective, the module will present a real-world case that illustrates the substantial harm insiders can inflict. By the conclusion, you will understand the dangers posed by insiders and the importance of vigilance and strategic risk management.
What's included
1 assignment
This module looks into the human psyche and behaviors behind insider threats. We’ll discuss psychological factors (like stress, personality, and personal grievances) that can contribute to malicious insider threats, and the typical behavioral warning signs that might precede an incident. We will introduce a model called the “Critical Pathway to Insider Risk” that describes how someone can progress from being an ordinary insider to posing a serious threat. By understanding the human element—the motivations and warning signs—we can better anticipate and prevent insider incidents.
What's included
1 assignment
Having explored what insider risk is—and the psychological and behavioral factors that contribute to it—we can now step back and consider the bigger picture. Insider threats don’t just impact individual organizations; they can have far-reaching national and even global consequences. In this module, we’ll explore how insider access enables cyberattacks, terrorism, and violence from within. We will talk about how some insider threats can escalate to targeted violence, like workplace violence, and why modern insider risk programs often overlap with workplace violence prevention. We’ll also look at how insider threats can impact strategic systems, including critical infrastructure, defense and intelligence, financial institutions, healthcare, and beyond. Insider threat is larger than the IT department or organization itself. It is a significant element of overall security, including national security and public safety. Insider threat isn’t just an organizational problem—it can touch anyone. Understanding these threats helps you recognize warning signs, take preventive action in your own workplace, and contribute to safety, security, and resilience on a broader scale.
What's included
1 assignment
This module explores how workplace culture, management practices, and overall organizational dynamics can affect insider risk. We’ll talk about what a “security-conscious” culture looks like versus a toxic culture, and why “tone from the top” is so important. We’ll also cover practical steps organizations can take to encourage employees to report concerns and follow security best practices. Additionally, we’ll highlight some resources (from government and industry) that organizations can use to build robust insider risk programs. Prevention is not just about vetting and watching people, but also about shaping an environment where insiders are less likely to go rogue and more likely to be caught if they do.
What's included
1 assignment
Insider risk management benefits greatly from established frameworks that bring structure and consistency to how organizations approach the problem. These frameworks move security efforts from guesswork to proven practice—helping organizations avoid blind spots, prioritize resources, and respond effectively to incidents . They also benefit individual workers within the organization by explaining how and why security decisions are made—everything from access privileges to workplace culture. This module introduces some key frameworks used in insider threat programs, such as the NIST Cybersecurity Framework and the MITRE Insider Threat Framework, and how they can be applied or adapted to insider risk. We’ll also look at how modern programs integrate social science within these technical frameworks. Finally, we’ll discuss the importance of keeping these programs up-to-date, incorporating the latest research and adjusting to evolving and emerging threats.
What's included
1 reading1 assignment1 plugin
Instructor

Offered by
Why people choose Coursera for their career

Felipe M.

Jennifer J.

Larry W.

Chaitanya A.

Open new doors with Coursera Plus
Unlimited access to 10,000+ world-class courses, hands-on projects, and job-ready certificate programs - all included in your subscription
Advance your career with an online degree
Earn a degree from world-class universities - 100% online
Join over 3,400 global companies that choose Coursera for Business
Upskill your employees to excel in the digital economy
Frequently asked questions
To access the course materials, assignments and to earn a Certificate, you will need to purchase the Certificate experience when you enroll in a course. You can try a Free Trial instead, or apply for Financial Aid. The course may offer 'Full Course, No Certificate' instead. This option lets you see all course materials, submit required assessments, and get a final grade. This also means that you will not be able to purchase a Certificate experience.
When you purchase a Certificate you get access to all course materials, including graded assignments. Upon completing the course, your electronic Certificate will be added to your Accomplishments page - from there, you can print your Certificate or add it to your LinkedIn profile.
Yes. In select learning programs, you can apply for financial aid or a scholarship if you can’t afford the enrollment fee. If fin aid or scholarship is available for your learning program selection, you’ll find a link to apply on the description page.
More questions
Financial aid available,

