Respecting Privileged Access
Course Description
In a typical organization, several employees — usually in senior positions — have privileged access to data and systems. While this access is necessary for them to do their jobs, the elevated access they have can also lead to harmful changes to devices, applications or infrastructure.
GLS’s Respecting Privileged Access training course explains what privileged access is, the risks associated with it, what can be done to mitigate the risks, and the best practices employees with privileged access should follow. It also includes timely knowledge check questions to test the user’s understanding of the content.
- Topic
- Security Awareness
- Learning Modality
- Courseware
- Role/Audience
- Senior-Level, Administrators
- Language
- English Only
- Total Time
- 20 Minutes
Privileged access training minimizes risks
Did you know that 74% of data breaches begin with privileged access abuse?
The main goal of any cyber attack is to gain access to sensitive data. Who has the most convenient access to sensitive data? Employees with privileged access. Since privileged access accounts provide the most direct route to this sensitive data, cybercriminals blatantly target these accounts — and their users.
Course Curriculum
Module 1: Forms of Privileged Access
- Introduction to privileged access
- What are access rights?
- Common capabilities of privileged access
- Types of human privileged access accounts
- Types of machine privileged access accounts
- Knowledge check questions
Module 2: Privileged Account Risks and Protections
- The risks of privileged access
- Examples of privileged access misuse
- Cybersecurity control strategies for mitigating risks
- Importance of consistently logging and monitoring privileged access rights
- How individuals with privileged access can secure their credentials and prevent credential misuse
- Cybersecurity best practices that individuals with privileged access must follow
- Knowledge check questions
Upon completion, learners will be able to:
- Define access rights and privileged access
- List the possible capabilities of privileged access accounts
- Describe and identify the five types of privileged human accounts: Superuser Account, Domain Admin Account, Local Admin Account, Emergency Account and Business User Account
- Describe and identify the three types of machine privileged accounts: Application Accounts, Service Accounts and Bot Accounts
- Explain how privileged accounts can be misused — either accidentally or deliberately
- Follow cybersecurity best practices to mitigate the risks of privileged access
- Implement personal best practices to protect privileged accounts and their credentials
Request a Demo or Quote
Please complete the form below and a GLS representative will contact you