Cyberark Online Training
Introduction
CyberArk is an information security company mainly dedicated to privileged account security. The CyberArk Privileged Account Security solution comprises features that secure, monitor and manage confidential accounts. Every component of the segmental solution can be managed individually or used in grouping for operating systems, applications, databases, hypervisors, security appliances, network devices, and more. The solution can be deployed in the cloud, on-premises, and across OT/SCADA environments.
Course Objectives
- Understand the fundamentals of Privileged Account Security
- Learn about the CyberArk Components
- How to install and Configure CyberArk pim Suite
- Learn about PAS Operations and Maintenance
- How to implement Backup and Recovery.
Prerequisites:
- Basic Knowledge of Network Concepts and UNIX/Linux would be beneficial.
Course Curriculum
1.CyberArk EPV Operations
a.PAS Overview
- High level product overview of CyberArk suite
- Components
b.Enterprise Password Vault
- Functionality of each components
- EPV Solution Overview
- Architecture & communication matrix
c.User Management & Integration with other tools
- The Built in Users
- LDAP integration
- Authentication
- Integration with SIEM, SMTP, Remote control agent
d.Safe Design & Access Control
- Naming Conventions
- Safe Creation
- Safe Authorizations
e.Password Management
- Master Policy
- Platform policy creation
- Defining exceptions, OTP, Dual Control policies
f.Account Onboarding
- Onboarding methods
- Password Upload Utility
- Account Discovery
- Web services
g.Fault Tolerance
- High Availability (HA)
- Disaster Recovery (DR)
- Backup and Restore
h.Reports & Troubleshooting Automation Failures
- Generation of various reports
- Troubleshooting automation failures
2.CyberArk EPV Infrastructure
a.PAS Overview
- High level product overview of CyberArk suite
- Components
b.High Availability
- Architecture
- CyberArk Cluster
- Vault environment
- Installation
c.Multiple components : CPM, PVWA and PSM
- Redundancies
- Functionality
- Installation
- Load balancing
d.CPM Usages
- Windows Scheduled Tasks
- IIS Application Pool
- Windows Registry
- Configuration Files
- Database String
- Private SSH Key
e.Advanced Authentication
- Vault level Authentication
- PVWA level Authentication
- Two-Factor Authentication
d.PSM Connection Components
- PSM review
- Connection Components
- Configuration Types & Examples
e.Troubleshooting Basics
- Logs Files
- Common Issues
f.Securing CyberArk
- Best Practices
- Using Secure Protocols
- Managing CyberArk component users with CPM
Course Reviews
No Reviews found for this course.
Write a Review