Security & Risk Management

Privileged User Accounts: Best Practices (Technical Briefings)

Course Overview
What type of account is a favorite target of hackers and cyber thieves the world over? It's the privileged user account, of course. You see, access to a privileged user account is like having the keys to the proverbial kingdom. Just ask Eric Snowden, or the thieves responsible for the Target breach. In order to stop your organization from becoming the next victim of a privileged user attack, this report will provide practical advice and best practices to help keep your systems and data safe and secure. Our program features expert, Trevor Smith, Executive Vice President of Brite Computers, a full systems -integrator and consultancy, based in New York State.

Track: Technical Briefings
In-depth information on new technologies, techniques and solution providers



Learning Objectives:

Upon successful completion of this segment, you should be able to:
  • Recognize to what extent privileged users are a threat to enterprise security today;
  • Identify the "bad practices" that can cause issues around privileged user accounts;
  • Know the tools to help manage and control user accounts;
  • Discuss best practices to help keep your privileged accounts in check.

Content Partner:

WatchIT


Speaker / Author:

Software & Hardware Requirements:

  • 56k or Greater Internet Connection
  • Adobe Acrobat® Reader for the .pdf files
  • Adobe® Flash® Player 9 or higher
  • Modern DHTML Compatible Browser
  • Ram: 256 MB minimum
  • Sound card with speakers/headphones
  • Windows or Mac OS

Buy

Price (USD)

Standard Rate: $29.00
Subscribers: $29.00
Pillsbury U Online: $29.00
Metro State Univ: FREE

Details

Course Code : WIT-1900

Release Date: 12/01/2016
Expire Date: 01/01/2018
Credits:
CEU 0.50
ISC 0.50

Course Level: N/A

Passing Grade: 70%
Format Type: Flash

Returning Subscribers

Login
- OR -
Login