Categories: Cyber Security
Wishlist Share
Share Course
Page Link
Share On Social Media
Popup Form Example

Add Suggestion

About Course

See Full Course Details

Schedule: MON – FRI 4 hours (Time: 9 AM to 1 PM & 2 PM to 6 PM ) |SAT/SUN 8 hours (9 AM to 6 PM)

What Will You Learn?

  • 1. **Introduction to Privileged Access Management (PAM)**: Understand the importance of privileged access management in securing sensitive systems and data, and the role of CyberArk solutions in mitigating privileged access risks.
  • 2. **CyberArk Architecture and Components**: Learn about the architecture and components of the CyberArk PAM suite, including the Enterprise Password Vault (EPV), Privileged Session Manager (PSM), and Central Policy Manager (CPM).
  • 3. **Vault Deployment and Configuration**: Deploy and configure the CyberArk Vault to securely store and manage privileged account credentials, secrets, and SSH keys.
  • 4. **Password Management**: Implement password rotation, automatic password changing, and password policies to ensure the security and integrity of privileged account credentials.
  • 5. **Session Management**: Configure and manage privileged sessions using the Privileged Session Manager (PSM) to monitor, record, and control access to critical systems and applications.
  • 6. **Access Control Policies**: Define and enforce access control policies to restrict and monitor privileged access based on user roles, permissions, and session attributes.
  • 7. **Integration with IT Infrastructure**: Integrate CyberArk solutions with existing IT infrastructure, including directory services, authentication systems, and security information and event management (SIEM) solutions.
  • 8. **Privileged Threat Analytics**: Utilize privileged threat analytics features to detect and respond to suspicious activities, anomalous behavior, and security threats involving privileged accounts.
  • 9. **High Availability and Disaster Recovery**: Implement high availability (HA) and disaster recovery (DR) configurations to ensure continuous availability and reliability of CyberArk solutions.
  • 10. **Auditing and Reporting**: Generate audit trails, compliance reports, and security analytics to demonstrate compliance with regulatory requirements and internal security policies.
  • 11. **Troubleshooting and Support**: Identify and troubleshoot common issues and errors related to CyberArk deployments, and effectively communicate with CyberArk support for assistance.
  • 12. **Best Practices and Security Recommendations**: Learn best practices for securing privileged access, minimizing attack surfaces, and optimizing the performance and scalability of CyberArk solutions.

Course Modules

Module 1

Student Ratings & Reviews

No Review Yet
No Review Yet