← Back to overview

More Privileges — What Now?

Within organisations, some employees have elevated or privileged access. They can access sensitive systems, data and functions that regular users cannot. Security professionals often refer to these accounts as “the keys to the kingdom” — because misuse or compromise can have serious consequences.

In the e-learning More Privileges — What Now?, participants learn what it means to be a privileged user and why their role is so critical to organisational security. The course shows that additional privileges do not just bring more capabilities, but also greater responsibility.

Through two story-driven videos, the risks and dilemmas become tangible.

In the first video, Eva is the only person with full network access. The course highlights the risks this creates for both security and continuity, and explains why having a documented backup or handover plan is essential.

In the second video, Claire receives additional privileges to perform her work. When something goes wrong, it becomes clear how quickly elevated access can be abused and why the principle of least privilege is so important.

The course addresses insider threats, both unintentional and malicious. Privileged users can accidentally spread malware, leak data or bypass controls. At the same time, they can play a vital positive role by recognising suspicious activity and reporting it promptly.

Participants also learn how to handle privileged data securely. The course explains what is allowed and what is not, including limiting access on a need-to-know basis, secure storage and transmission of data, encryption and avoiding unsecured devices.

The e-learning concludes with clear guidelines and practical advice. By using strong passwords, enabling multi-factor authentication, keeping systems up to date and following organisational security policies, privileged users can significantly reduce security risks.

The message is clear: with greater privileges comes greater responsibility — and conscious behaviour makes all the difference.

What will participants learn?

After completing this course, participants will:

  • understand what a privileged user is
  • know why elevated access increases risk
  • recognise intentional and unintentional insider threats
  • understand least privilege and need-to-know principles
  • know how to store and share sensitive data securely
  • act proactively and report incidents appropriately

Who is this course for?

This course is suitable for:

  • IT administrators and system managers
  • employees with elevated or temporary privileges
  • organisations managing privileged access risks
  • teams addressing insider threats

Why this course is relevant right now

Attacks targeting privileged accounts are increasing. Raising awareness among users with elevated access is one of the most effective ways to prevent high-impact security incidents.