• Sponsor Resources
  • Related Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls
    • Next Gen Firewalls
    • Data Protection
    • Vulnerability Management
    • Cloud Security
    • Behavioral Threat Analytics
    • Emerging Threats
    • Next Gen Autentication

Lesson 1:


This video explains how best to manage and monitor privileged access rights and the people who need them.

Privileged access problem

Lesson 2:


Learn some quick fixes to prevent access creep and maintain the core security principle of least privilege.

Preventing privilege creep

Lesson 3:


This podcast covers some of the best ways of ensuring trusted users can't step over the line or inadvertently give away their privileges to someone else.

Controlling trusted users

Quiz:


This quiz will test you on the key points we’ve covered in the webcast, podcast and article in this Security School.

Privileged Access: Quiz

Priviliged Access

Learn how to implement effective logging and monitoring of priviliged user accounts so a potential security incident involving priviliged access can be quickly mitigated or avoided entirely.

TOP

Michael Cobb
CISSP-ISSAP - SearchSecurity

Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He co-authored the book IIS Security and has written numerous technical articles for leading IT publications. He has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS). Mike has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data, and of following good practices.

TOP


Sponsor Resources

CyberArk is the only security company laser-focused on striking down targeted cyber threats that make their way inside — undetected — to attack the heart of the enterprise. More than 3,200 global businesses trust CyberArk to protect their highest value assets, enabling them to master audit and IT compliance requirements.

Learn More
  • 5 top reasons to prioritize privileged account security today

  • The Cyber Attackers Playbook

  • Securing Privilege on the Endpoint

  • eBook: Seven Things to Consider

  • IDC Tech Spotlight Key Considerations for Securing Privilege on the Endpoint

  • Rapid Risk Reduction A 30-Day Sprint to Protect Privileged Credentials

  • Global Advanced Threat Landscape Survey 2016




TOP



Editorial Resources

About SearchSecurity

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We're the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more -- all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.

Learn More
  • What does bimodal IAM mean for user credentials?

  • Breaking bad password habits in the enterprise

  • Why privileged account management is hard to scale

  • Password malware: Can Trojans that capture passwords be mitigated?


TOP

Follow Us

20k
9.5k
3.4k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111