Privileged Access Management (Pam)
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.29 GB | Duration: 5h 0m
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.29 GB | Duration: 5h 0m
Immersion in Privileged Access Management with CyberArk
What you'll learn
Privileged Access Management (PAM)
PAM Features & Capabilities
CyberArk functionalities
Identity and Access Management (IAM)
Requirements
Basic IT and Cyber Security knowledge (optional)
Description
In today's interconnected world, protecting privileged access is a critical challenge for organizations. Cybercriminals and malicious insiders increasingly target privileged accounts to gain control over sensitive systems. This is why Privileged Access Management (PAM) has become a fundamental pillar of enterprise cybersecurity, ensuring that access to critical resources is properly secured and monitored.Enhance your cybersecurity expertise by mastering Privileged Access Management (PAM)—one of the most crucial and sensitive areas of Identity and Access Management (IAM).This comprehensive course provides an in-depth exploration of PAM architectures, key components, and essential security features. Learn how modern PAM solutions are structured, how they integrate with enterprise environments, and how organizations can leverage them to enhance security, enforce least privilege policies, and ensure compliance.Discover and apply major PAM functionalities, including:Password management to automatically manage and secure privileged credentialsSession management to monitor and audit privileged activitiesReporting & threat detection to identify and respond to suspicious behaviorsImmerse yourself in hands-on labs featuring CyberArk, the market-leading PAM solution. Get practical experience in securing privileged accounts, managing access policies, configuring session monitoring, and implementing proactive threat mitigation. Through real-world scenarios, you will understand how organizations use PAM to protect their most critical assets.By the end of this course, you will have a solid grasp of PAM architectures, key functionalities, and security best practices. Equip yourself with the skills needed to navigate the complex world of privileged access management and take a decisive step toward a career in cybersecurity.
Overview
Section 1: Getting Started
Lecture 1 Agenda
Lecture 2 Course Introduction
Lecture 3 Meet your instructor
Lecture 4 What is Identity and Access Management (IAM) ? (1/3)
Lecture 5 What is Identity and Access Management (IAM) ? (2/3)
Lecture 6 What is Identity and Access Management (IAM) ? (3/3)
Lecture 7 What is Privileged Access Management (PAM) ? (1/2)
Lecture 8 What is Privileged Access Management (PAM) ? (2/2)
Lecture 9 Main end users
Section 2: CyberArk Components & Architecture
Lecture 10 Components & Architecture Introduction
Lecture 11 LAB : First Connection
Lecture 12 Main components
Lecture 13 The Digital Vault
Lecture 14 The Disaster Recovery Vault
Lecture 15 The Password Vault Web Access (PVWA)
Lecture 16 The Privileged Session Manager (PSM)
Lecture 17 The Central Policy Manager (CPM)
Lecture 18 The Privileged Threat Analytics (PTA)
Section 3: Objects & Permissions
Lecture 19 Objects introduction
Lecture 20 The Master Policy
Lecture 21 LAB : First look at the Master Policy
Lecture 22 The platform
Lecture 23 LAB : First look at a platform (1/2)
Lecture 24 LAB : First look at a platform (2/2) (coming soon)
Lecture 25 The safe
Lecture 26 Safe Design (1/6)
Lecture 27 Safe Design (2/6)
Lecture 28 Safe Design (3/6) - Naming Convention
Lecture 29 Safe Design (4/6) - Naming Convention
Lecture 30 Safe Design (5/6) - Permissions
Lecture 31 Safe Design (6/6) - Permissions
Lecture 32 The account (1/2)
Lecture 33 The account (2/2)
Lecture 34 LAB : Safe Creation & Permissions
Lecture 35 Part 3 summary
Section 4: Main Capabilities
Lecture 36 Introduction to PAM Capabilities (Framework)
Section 5: Credential Management
Lecture 37 Credential Management introduction
Lecture 38 Password Policy
Lecture 39 Password verification
Lecture 40 Password rotation
Lecture 41 Password reconciliation
Lecture 42 Password complexity
Lecture 43 LAB : Master & Platform password policy
Lecture 44 Account onboarding (1/2)
Lecture 45 Account onboarding (2/2)
Lecture 46 LAB : Manual account onboarding
Lecture 47 Account Discovery (1/2)
Lecture 48 Account Discovery (2/2)
Lecture 49 LAB : Account discovery (coming soon)
Section 6: Session Management
Lecture 50 Session management introduction
Lecture 51 Session Isolation
Lecture 52 Plugins / Connectors
Lecture 53 RDP session
Lecture 54 SSH session
Lecture 55 LAB : SSH session (coming soon)
Lecture 56 Workflows (1/4)
Lecture 57 Workflows (2/4)
Lecture 58 Workflows (3/4)
Lecture 59 Workflows (4/4)
Lecture 60 LAB : Workflows (coming soon)
Section 7: Audit & Compliance
Lecture 61 Audit & Compliance introduction
Lecture 62 Session Recording
Lecture 63 LAB : Session recording (coming soon)
Lecture 64 Session audit
Lecture 65 Session monitoring
Lecture 66 Reporting (1/2)
Lecture 67 Reporting (2/2) (coming soon)
Lecture 68 LAB : Reporting (coming soon)
Section 8: Risk & Alerting
Lecture 69 Risk & Alerting introduction
Lecture 70 SIEM Integration
Lecture 71 Alerting
Lecture 72 Risk scoring
Lecture 73 Automatic remediation
IAM consultant / engineer,PAM consultant / engineer,IT professionals,IT and Cybersecurity students,Information Security Professional,CISO