CyberArk Privilege Access Management
The CyberArk Privileged Access Management (PAM) course provides in-depth training on managing and securing privileged accounts, credentials, and access. Participants learn to implement CyberArk’s solutions to protect against insider threats and cyberattacks by controlling and monitoring privileged access across an organization’s IT environment. The course covers key features of CyberArk’s platform, including vaulting, session management, and real-time threat detection, equipping professionals with the skills to enforce strong security practices and safeguard critical systems and data.
————————————–
CyberArk Privilege Access Management Course Highlights
-
01
Lifetime access
-
02
Real-time case studies
-
03
24*7 Support from our team of administrators
-
04
Lifetime video access
-
05
The project integrated into the Curriculum
-
06
Access to Recorded Sessions
-
07
Interview Prep
-
08
Lab Access – Virtual Labs
Training Calender
Start Date | End Date | Start-End Time | Batch Type | Training Mode | Batch Status | Start Learning |
---|---|---|---|---|---|---|
27th Sep 2024 | 25th Nov 2024 | 09:00 - 13:00 IST | Weekend | Online | (Open) | Enroll Now |
Course Syllabus
Module - 1 (Privileged Identity Management – Introduction)
Privileged Identity Management – Introductionnt
Enterprise pain areas
Associated risk
Expected Solution
Module - 2 (CyberArk Overview)
CyberArk Overview
Module - 3 (CyberArk Solution Components)
CyberArk Solution Components
CyberArk Vault
Password Vault Web Access Manager
Privileged Session Manager
Central Password Manager
CyberArk Vault Client.
Module - 4 (Overview of CyberArk functioning)
Overview of CyberArk functioning
Module - 5 (CyberArk Infrastructure Installation)
CyberArk Infrastructure Installation
Installation Pre-requisites (Network, Software OS/Hardware)
CyberArk Port awareness.
CyberArk Vault Installation.
CyberArk Active Directory Integration.
CyberArk Email Notification engine configure awareness.
Cyberark CPM Installation.
Cyberark PVWA Installation.
Cyberark PSM Installation.
Cyberark Vault Client Installation.
Module - 6 (CyberArk Policy Configuration Overview)
CyberArk Policy Configuration Overview
Module - 7 (CyberArk Policy Creation)
CyberArk Policy Creation
Master Policy
CPM Platform Policy
Scheduled Task
Services
Module - 8 (CyberArk Safe Management)
CyberArk Safe Management
Safe Creation
User addition (Ldap)
User Access Matrix
Dual Control
Object Level Access Control
Module - 9 (CyberArk Account Integration)
CyberArk Account Integration
Windows
Unix/Linux
Network Device Overview
Security Device Overview.
Module - 10 (CyberArk Use Cases)
CyberArk Use Cases
User OnBoarding
Privileged Single-Sign-on
Password Reconciliation
Access privilege of User Accounts in PAM
Authentication (2-factor) Overview
Dual Access Control
Auditing/Reporting
Session Recording
Users OffBoarding
Module - 11 (CyberArk Vault Backup Activity)
CyberArk Vault Backup Activity
Module - 12 (CyberArk Trouble Shooting)
CyberArk Trouble Shooting
Creating an encrypted credential password file for pvwaapp user
Creating an encrypted credential password file for gw user
Creating an encrypted credential password file for a password manager user
Creating an encrypted credential password file for psmapp user creating an encrypted credential password file for psmgw user
Unlocking and password resetting of all above-mentioned system users
Module - 13 (CyberArk DR Overview)
CyberArk DR Overview
DR Vault
DR CPM
DR PVWA
DR PSM
Our Reviews
What Says Our Happy Clients
START LEARNING
Still Unsure ? Contact us & we will get back to you.
Let’s Connect
Email Information
Trainings: trainings@cyberhuntit.com
Business : sales@cyberhuntit.com
Recruitment information / General – hr@cyberhuntit.com
Address
Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016