Privileged Accounts
Secure use of privileged access – training for power users with elevated rights.
Main chapter
Local admin rights
- What are local admin rights?
- Why do security experts dislike local admin rights?
- What responsibility does they entail?
Main chapter
Identity & Access Management
- What is identity management?
- Which identities are managed centrally by IT, which by administrators in the specialist areas?
- What responsibility does this entail?
Main chapter
Software from the Internet
- Why software and apps from the Internet pose a risk to IT security
- What can happen in the worst case scenario — real threats and consequences
- Shadow IT: When employees use tools without informing IT
Main chapter
Admin passwords
- Why do privileged passwords have to be particularly strong?
- Why do they absolutely have to be different?
- And how do you deal with privileged passwords?
Main chapter
Password management
- How secure are password managers?
- Should you use password managers?
- If yes, which one? Where are the limits?
Main chapter
Multi-factor authentication
- What does multi-factor authentication mean?
- Why is that so good?
- What types are there?
- Residual risks.
Main chapter
Cyber incident
- What is a cyber incident?
- What do you do in the event of a security incident?
- Real examples: Real cyber security attacks
- Who you should contact in an emergency
.png)