Privileged Access Management (Pam)

Posted By: ELK1nG

Privileged Access Management (Pam)
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.29 GB | Duration: 5h 0m

Immersion in Privileged Access Management with CyberArk

What you'll learn

Privileged Access Management (PAM)

PAM Features & Capabilities

CyberArk functionalities

Identity and Access Management (IAM)

Requirements

Basic IT and Cyber Security knowledge (optional)

Description

In today's interconnected world, protecting privileged access is a critical challenge for organizations. Cybercriminals and malicious insiders increasingly target privileged accounts to gain control over sensitive systems. This is why Privileged Access Management (PAM) has become a fundamental pillar of enterprise cybersecurity, ensuring that access to critical resources is properly secured and monitored.Enhance your cybersecurity expertise by mastering Privileged Access Management (PAM)—one of the most crucial and sensitive areas of Identity and Access Management (IAM).This comprehensive course provides an in-depth exploration of PAM architectures, key components, and essential security features. Learn how modern PAM solutions are structured, how they integrate with enterprise environments, and how organizations can leverage them to enhance security, enforce least privilege policies, and ensure compliance.Discover and apply major PAM functionalities, including:Password management to automatically manage and secure privileged credentialsSession management to monitor and audit privileged activitiesReporting & threat detection to identify and respond to suspicious behaviorsImmerse yourself in hands-on labs featuring CyberArk, the market-leading PAM solution. Get practical experience in securing privileged accounts, managing access policies, configuring session monitoring, and implementing proactive threat mitigation. Through real-world scenarios, you will understand how organizations use PAM to protect their most critical assets.By the end of this course, you will have a solid grasp of PAM architectures, key functionalities, and security best practices. Equip yourself with the skills needed to navigate the complex world of privileged access management and take a decisive step toward a career in cybersecurity.

Overview

Section 1: Getting Started

Lecture 1 Agenda

Lecture 2 Course Introduction

Lecture 3 Meet your instructor

Lecture 4 What is Identity and Access Management (IAM) ? (1/3)

Lecture 5 What is Identity and Access Management (IAM) ? (2/3)

Lecture 6 What is Identity and Access Management (IAM) ? (3/3)

Lecture 7 What is Privileged Access Management (PAM) ? (1/2)

Lecture 8 What is Privileged Access Management (PAM) ? (2/2)

Lecture 9 Main end users

Section 2: CyberArk Components & Architecture

Lecture 10 Components & Architecture Introduction

Lecture 11 LAB : First Connection

Lecture 12 Main components

Lecture 13 The Digital Vault

Lecture 14 The Disaster Recovery Vault

Lecture 15 The Password Vault Web Access (PVWA)

Lecture 16 The Privileged Session Manager (PSM)

Lecture 17 The Central Policy Manager (CPM)

Lecture 18 The Privileged Threat Analytics (PTA)

Section 3: Objects & Permissions

Lecture 19 Objects introduction

Lecture 20 The Master Policy

Lecture 21 LAB : First look at the Master Policy

Lecture 22 The platform

Lecture 23 LAB : First look at a platform (1/2)

Lecture 24 LAB : First look at a platform (2/2) (coming soon)

Lecture 25 The safe

Lecture 26 Safe Design (1/6)

Lecture 27 Safe Design (2/6)

Lecture 28 Safe Design (3/6) - Naming Convention

Lecture 29 Safe Design (4/6) - Naming Convention

Lecture 30 Safe Design (5/6) - Permissions

Lecture 31 Safe Design (6/6) - Permissions

Lecture 32 The account (1/2)

Lecture 33 The account (2/2)

Lecture 34 LAB : Safe Creation & Permissions

Lecture 35 Part 3 summary

Section 4: Main Capabilities

Lecture 36 Introduction to PAM Capabilities (Framework)

Section 5: Credential Management

Lecture 37 Credential Management introduction

Lecture 38 Password Policy

Lecture 39 Password verification

Lecture 40 Password rotation

Lecture 41 Password reconciliation

Lecture 42 Password complexity

Lecture 43 LAB : Master & Platform password policy

Lecture 44 Account onboarding (1/2)

Lecture 45 Account onboarding (2/2)

Lecture 46 LAB : Manual account onboarding

Lecture 47 Account Discovery (1/2)

Lecture 48 Account Discovery (2/2)

Lecture 49 LAB : Account discovery (coming soon)

Section 6: Session Management

Lecture 50 Session management introduction

Lecture 51 Session Isolation

Lecture 52 Plugins / Connectors

Lecture 53 RDP session

Lecture 54 SSH session

Lecture 55 LAB : SSH session (coming soon)

Lecture 56 Workflows (1/4)

Lecture 57 Workflows (2/4)

Lecture 58 Workflows (3/4)

Lecture 59 Workflows (4/4)

Lecture 60 LAB : Workflows (coming soon)

Section 7: Audit & Compliance

Lecture 61 Audit & Compliance introduction

Lecture 62 Session Recording

Lecture 63 LAB : Session recording (coming soon)

Lecture 64 Session audit

Lecture 65 Session monitoring

Lecture 66 Reporting (1/2)

Lecture 67 Reporting (2/2) (coming soon)

Lecture 68 LAB : Reporting (coming soon)

Section 8: Risk & Alerting

Lecture 69 Risk & Alerting introduction

Lecture 70 SIEM Integration

Lecture 71 Alerting

Lecture 72 Risk scoring

Lecture 73 Automatic remediation

IAM consultant / engineer,PAM consultant / engineer,IT professionals,IT and Cybersecurity students,Information Security Professional,CISO