-
The course covers the core functions and tasks required to secure IT administrators' access to your organization's most sensitive infrastructure resources.
You will gain extensive hands-on experience in deploying and managing the solution using step-by-step instructions and the dedicated lab environment. This course provides you with the knowledge and skills required to deploy, manage, monitor and troubleshoot a new implementation. It includes discussions on solution architecture, identity management, credential vaulting and rotation, secure access to infrastructure resources, and more.
-
Course Contents
-
- System architecture of the solution
- Relevant components
- Onboarding and managing passwords (verification, change, and synchronization)
- Onboarding accounts using the various tools available (bulk upload, discovery, RestAPI)
- Secure access to infrastructure resources with vault credentials
- Monitoring session recordings and session commands
- Activity reports
- Knowledge base and other resources available to solve problems
Each participant will receive the original English-language documents from CyberArk in PDF format.
-
Target Group
-
New Privilege Cloud administrators who may or may not be familiar with the PAM ideology in general.
-
Knowledge Prerequisites
-
- Basic network knowledge
- Basic knowledge of Windows administration
- Basic knowledge of Linux
-
Course Objective
-
You will gain in-depth knowledge of deploying, managing, monitoring and troubleshooting the solution to secure administrator access to the most critical infrastructure resources. You will gain hands-on experience in a lab environment and learn system architecture, identity management, vaulting, credential rotation and access security.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
-
The course covers the core functions and tasks required to secure IT administrators' access to your organization's most sensitive infrastructure resources.
You will gain extensive hands-on experience in deploying and managing the solution using step-by-step instructions and the dedicated lab environment. This course provides you with the knowledge and skills required to deploy, manage, monitor and troubleshoot a new implementation. It includes discussions on solution architecture, identity management, credential vaulting and rotation, secure access to infrastructure resources, and more.
-
Course Contents
-
- System architecture of the solution
- Relevant components
- Onboarding and managing passwords (verification, change, and synchronization)
- Onboarding accounts using the various tools available (bulk upload, discovery, RestAPI)
- Secure access to infrastructure resources with vault credentials
- Monitoring session recordings and session commands
- Activity reports
- Knowledge base and other resources available to solve problems
Each participant will receive the original English-language documents from CyberArk in PDF format.
-
Target Group
-
New Privilege Cloud administrators who may or may not be familiar with the PAM ideology in general.
-
Knowledge Prerequisites
-
- Basic network knowledge
- Basic knowledge of Windows administration
- Basic knowledge of Linux
-
Course Objective
-
You will gain in-depth knowledge of deploying, managing, monitoring and troubleshooting the solution to secure administrator access to the most critical infrastructure resources. You will gain hands-on experience in a lab environment and learn system architecture, identity management, vaulting, credential rotation and access security.
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
