Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)
What Will You Learn?
1. **Introduction to Privileged Access Management (PAM)**: Understand the importance of privileged access management in securing sensitive systems and data, and the role of CyberArk solutions in mitigating privileged access risks.
2. **CyberArk Architecture and Components**: Learn about the architecture and components of the CyberArk PAM suite, including the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and Central Policy Manager (CPM).
3. **Vault Deployment and Configuration**: Deploy and configure the CyberArk Vault to securely store and manage privileged account credentials, secrets, and SSH keys.
4. **Password Management**: Implement password rotation, automatic password changing, and password policies to ensure the security and integrity of privileged account credentials.
5. **Session Management**: Configure and manage privileged sessions using the Privileged Session Manager (PSM) to monitor, record, and control access to critical systems and applications.
6. **Access Control Policies**: Define and enforce access control policies to restrict and monitor privileged access based on user roles, permissions, and session attributes.
7. **Integration with IT Infrastructure**: Integrate CyberArk solutions with existing IT infrastructure, including directory services, authentication systems, and security information and event management (SIEM) solutions.
8. **Privileged Threat Analytics**: Utilize privileged threat analytics features to detect and respond to suspicious activities, anomalous behavior, and security threats involving privileged accounts.
9. **High Availability and Disaster Recovery**: Implement high availability (HA) and disaster recovery (DR) configurations to ensure continuous availability and reliability of CyberArk solutions.
10. **Auditing and Reporting**: Generate audit trails, compliance reports, and security analytics to demonstrate compliance with regulatory requirements and internal security policies.
11. **Troubleshooting and Support**: Identify and troubleshoot common issues and errors related to CyberArk deployments, and effectively communicate with CyberArk support for assistance.
12. **Best Practices and Security Recommendations**: Learn best practices for securing privileged access, minimizing attack surfaces, and optimizing the performance and scalability of CyberArk solutions.