Privileged Accounts

Course
45 mins

Secure use of privileged access – training for power users with elevated rights.

Main chapter

Local admin rights

Kurs
5 mins
  • What are local admin rights?
  • Why do security experts dislike local admin rights?
  • What responsibility does they entail?

Main chapter

Identity & Access Management

Kurs
5 mins
  • What is identity management?
  • Which identities are managed centrally by IT, which by administrators in the specialist areas?
  • What responsibility does this entail?

Main chapter

Software from the Internet

Kurs
7 mins
  • Why software and apps from the Internet pose a risk to IT security
  • What can happen in the worst case scenario — real threats and consequences
  • Shadow IT: When employees use tools without informing IT

Main chapter

Admin passwords

Kurs
5 mins
  • Why do privileged passwords have to be particularly strong?
  • Why do they absolutely have to be different?
  • And how do you deal with privileged passwords?

Main chapter

Password management

Kurs
6 mins
  • How secure are password managers?
  • Should you use password managers?
  • If yes, which one? Where are the limits?

Main chapter

Multi-factor authentication

Kurs
5 mins
  • What does multi-factor authentication mean?
  • Why is that so good?
  • What types are there?
  • Residual risks.

Main chapter

Cyber incident

Kurs
7 mins
  • What is a cyber incident?
  • What do you do in the event of a security incident?
  • Real examples: Real cyber security attacks
  • Who you should contact in an emergency

Curious? Questions?

Local admin rights

5 mins
  • What are local admin rights?
  • Why do security experts dislike local admin rights?
  • What responsibility does they entail?

Identity & Access Management

5 mins
  • What is identity management?
  • Which identities are managed centrally by IT, which by administrators in the specialist areas?
  • What responsibility does this entail?

Software from the Internet

7 mins
  • Why software and apps from the Internet pose a risk to IT security
  • What can happen in the worst case scenario — real threats and consequences
  • Shadow IT: When employees use tools without informing IT

Admin passwords

5 mins
  • Why do privileged passwords have to be particularly strong?
  • Why do they absolutely have to be different?
  • And how do you deal with privileged passwords?

Password management

6 mins
  • How secure are password managers?
  • Should you use password managers?
  • If yes, which one? Where are the limits?

Multi-factor authentication

5 mins
  • What does multi-factor authentication mean?
  • Why is that so good?
  • What types are there?
  • Residual risks.

Cyber incident

7 mins
  • What is a cyber incident?
  • What do you do in the event of a security incident?
  • Real examples: Real cyber security attacks
  • Who you should contact in an emergency