Categories: Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media
Popup Form Example

Add Suggestion

About Course

See Full Course Details

Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)

What Will You Learn?

  • 1. **Introduction to Endpoint Privilege Management (EPM)**: Understand the importance of endpoint privilege management in securing endpoints and mitigating cyber threats, and the role of CyberArk's EPM solution in enforcing least privilege and application control policies.
  • 2. **CyberArk EPM Architecture and Components**: Learn about the architecture and components of CyberArk's Endpoint Privilege Manager, including the Policy Execution Engine (PEX), Local Admin Rights Manager (LARM), and Application Control (AppCtrl) components.
  • 3. **Agent Deployment and Configuration**: Deploy and configure EPM agents on endpoints to enforce least privilege policies, control local administrator rights, and restrict unauthorized applications and processes.
  • 4. **Least Privilege Management**: Implement least privilege policies to limit user privileges and permissions on endpoints, ensuring that users have only the privileges necessary to perform their job functions.
  • 5. **Application Control Policies**: Define and enforce application control policies to prevent the execution of unauthorized or malicious applications and processes on endpoints, based on application reputation, digital signatures, and behavioral analysis.
  • 6. **Local Admin Rights Management**: Manage local administrator rights on endpoints to prevent unauthorized users from gaining elevated privileges and installing unapproved software.
  • 7. **Privilege Elevation and Delegation**: Implement privilege elevation and delegation policies to allow users to temporarily elevate privileges or request access to specific resources or applications as needed, while still maintaining least privilege principles.
  • 8. **Integration with IT Infrastructure**: Integrate CyberArk's EPM solution with existing IT infrastructure, including directory services, authentication systems, and security information and event management (SIEM) solutions.
  • 9. **Policy Enforcement and Monitoring**: Monitor and enforce endpoint privilege management policies in real-time, with the ability to block, allow, or prompt users based on policy violations and security events.
  • 10. **Auditing and Reporting**: Generate audit trails, compliance reports, and security analytics to demonstrate compliance with regulatory requirements and internal security policies.
  • 11. **Troubleshooting and Support**: Identify and troubleshoot common issues and errors related to EPM deployments, and effectively communicate with CyberArk support for assistance.
  • 12. **Best Practices and Security Recommendations**: Learn best practices for securing endpoints, enforcing least privilege, and optimizing the performance and scalability of CyberArk's EPM solution.

Course Modules

Day 1: Privileged Access Management (PAM) Fundamentals

  • Introduction to Privileged Accounts
  • PAM Benefits and Use Cases
  • CyberArk PAM Overview

Day 2: PAM – Self-Hosted Deployment

Day 3: CyberArk Privilege Cloud

Day 4: Remote Access with Zero Trust

Day 5: Dynamic Privileged Access Control (DPAC)

Student Ratings & Reviews

No Review Yet
No Review Yet