Cyberark Online Training

Cyberark Online Training

0 STUDENTS ENROLLED

    Introduction

    CyberArk is an information security company mainly dedicated to privileged account security. The CyberArk Privileged Account Security solution comprises features that secure, monitor and manage confidential accounts. Every component of the segmental solution can be managed individually or used in grouping for operating systems, applications, databases, hypervisors, security appliances, network devices, and more. The solution can be deployed in the cloud, on-premises, and across OT/SCADA environments.

    Course Objectives

    • Understand the fundamentals of Privileged Account Security
    • Learn about the CyberArk Components
    • How to install and Configure CyberArk pim Suite
    • Learn about PAS Operations and Maintenance
    • How to implement Backup and Recovery.

    Prerequisites:

    • Basic Knowledge of Network Concepts and UNIX/Linux would be beneficial.

    Course Curriculum

    1.CyberArk EPV Operations

    a.PAS Overview

    • High level product overview of CyberArk suite
    • Components

    b.Enterprise Password Vault

    • Functionality of each components
    • EPV Solution Overview
    • Architecture & communication matrix

    c.User Management & Integration with other tools

    • The Built in Users
    • LDAP integration
    • Authentication
    • Integration with SIEM, SMTP, Remote control agent

    d.Safe Design & Access Control

    • Naming Conventions
    • Safe Creation
    • Safe Authorizations

    e.Password Management

    • Master Policy
    • Platform policy creation
    • Defining exceptions, OTP, Dual Control policies

    f.Account Onboarding

    • Onboarding methods
    • Password Upload Utility
    • Account Discovery
    • Web services

    g.Fault Tolerance

    • High Availability (HA)
    • Disaster Recovery (DR)
    • Backup and Restore

    h.Reports & Troubleshooting Automation Failures

    • Generation of various reports
    • Troubleshooting automation failures

    2.CyberArk EPV Infrastructure

    a.PAS Overview

    • High level product overview of CyberArk suite
    • Components

    b.High Availability

    • Architecture
    • CyberArk Cluster
    • Vault environment
    • Installation

    c.Multiple components : CPM, PVWA and PSM

    • Redundancies
    • Functionality
    • Installation
    • Load balancing

    d.CPM Usages

    • Windows Scheduled Tasks
    • IIS Application Pool
    • Windows Registry
    • Configuration Files
    • Database String
    • Private SSH Key

    e.Advanced Authentication

    • Vault level Authentication
    • PVWA level Authentication
    • Two-Factor Authentication

    d.PSM Connection Components

    • PSM review
    • Connection Components
    • Configuration Types & Examples

    e.Troubleshooting Basics

    • Logs Files
    • Common Issues

    f.Securing CyberArk

    • Best Practices
    • Using Secure Protocols
    • Managing CyberArk component users with CPM

     

    Write a Review

    Your email address will not be published.

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    PRIVATE COURSE
    • PRIVATE
    • 4 weeks, 2 days
    Contact Us

    +1 475-212-0075

    Drop us a query

      Your Details


      * Required

      Job Support

        Your Details


        * Required

        Course Features

        Live Instructor-led Classes

        This isn't canned learning. Its dynamic, its interactive, its effective

        Expert Educators

        Only the best or they're out. We are constantly evaluating our trainers

        24&7 Support

        We never sleep. Need something answered at 3 am? No Problem

        Flexible Schedule

        You don't learn as per our calendar. We work according to yours.

        Customized Training's

        The most part self-managed and adaptable to suit a person's particular adapting technology needs

        Priority Based Training's

        Real-time Scenario based Assignments and Case Studies

        COPYRIGHT © 2020 KEEN IT TECHNOLOGIES PVT.LTD, ALL RIGHTS RESERVED