Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Privileged Access Management (Pam)

    Posted By: ELK1nG
    Privileged Access Management (Pam)

    Privileged Access Management (Pam)
    Published 3/2025
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.29 GB | Duration: 5h 0m

    Immersion in Privileged Access Management with CyberArk

    What you'll learn

    Privileged Access Management (PAM)

    PAM Features & Capabilities

    CyberArk functionalities

    Identity and Access Management (IAM)

    Requirements

    Basic IT and Cyber Security knowledge (optional)

    Description

    In today's interconnected world, protecting privileged access is a critical challenge for organizations. Cybercriminals and malicious insiders increasingly target privileged accounts to gain control over sensitive systems. This is why Privileged Access Management (PAM) has become a fundamental pillar of enterprise cybersecurity, ensuring that access to critical resources is properly secured and monitored.Enhance your cybersecurity expertise by mastering Privileged Access Management (PAM)—one of the most crucial and sensitive areas of Identity and Access Management (IAM).This comprehensive course provides an in-depth exploration of PAM architectures, key components, and essential security features. Learn how modern PAM solutions are structured, how they integrate with enterprise environments, and how organizations can leverage them to enhance security, enforce least privilege policies, and ensure compliance.Discover and apply major PAM functionalities, including:Password management to automatically manage and secure privileged credentialsSession management to monitor and audit privileged activitiesReporting & threat detection to identify and respond to suspicious behaviorsImmerse yourself in hands-on labs featuring CyberArk, the market-leading PAM solution. Get practical experience in securing privileged accounts, managing access policies, configuring session monitoring, and implementing proactive threat mitigation. Through real-world scenarios, you will understand how organizations use PAM to protect their most critical assets.By the end of this course, you will have a solid grasp of PAM architectures, key functionalities, and security best practices. Equip yourself with the skills needed to navigate the complex world of privileged access management and take a decisive step toward a career in cybersecurity.

    Overview

    Section 1: Getting Started

    Lecture 1 Agenda

    Lecture 2 Course Introduction

    Lecture 3 Meet your instructor

    Lecture 4 What is Identity and Access Management (IAM) ? (1/3)

    Lecture 5 What is Identity and Access Management (IAM) ? (2/3)

    Lecture 6 What is Identity and Access Management (IAM) ? (3/3)

    Lecture 7 What is Privileged Access Management (PAM) ? (1/2)

    Lecture 8 What is Privileged Access Management (PAM) ? (2/2)

    Lecture 9 Main end users

    Section 2: CyberArk Components & Architecture

    Lecture 10 Components & Architecture Introduction

    Lecture 11 LAB : First Connection

    Lecture 12 Main components

    Lecture 13 The Digital Vault

    Lecture 14 The Disaster Recovery Vault

    Lecture 15 The Password Vault Web Access (PVWA)

    Lecture 16 The Privileged Session Manager (PSM)

    Lecture 17 The Central Policy Manager (CPM)

    Lecture 18 The Privileged Threat Analytics (PTA)

    Section 3: Objects & Permissions

    Lecture 19 Objects introduction

    Lecture 20 The Master Policy

    Lecture 21 LAB : First look at the Master Policy

    Lecture 22 The platform

    Lecture 23 LAB : First look at a platform (1/2)

    Lecture 24 LAB : First look at a platform (2/2) (coming soon)

    Lecture 25 The safe

    Lecture 26 Safe Design (1/6)

    Lecture 27 Safe Design (2/6)

    Lecture 28 Safe Design (3/6) - Naming Convention

    Lecture 29 Safe Design (4/6) - Naming Convention

    Lecture 30 Safe Design (5/6) - Permissions

    Lecture 31 Safe Design (6/6) - Permissions

    Lecture 32 The account (1/2)

    Lecture 33 The account (2/2)

    Lecture 34 LAB : Safe Creation & Permissions

    Lecture 35 Part 3 summary

    Section 4: Main Capabilities

    Lecture 36 Introduction to PAM Capabilities (Framework)

    Section 5: Credential Management

    Lecture 37 Credential Management introduction

    Lecture 38 Password Policy

    Lecture 39 Password verification

    Lecture 40 Password rotation

    Lecture 41 Password reconciliation

    Lecture 42 Password complexity

    Lecture 43 LAB : Master & Platform password policy

    Lecture 44 Account onboarding (1/2)

    Lecture 45 Account onboarding (2/2)

    Lecture 46 LAB : Manual account onboarding

    Lecture 47 Account Discovery (1/2)

    Lecture 48 Account Discovery (2/2)

    Lecture 49 LAB : Account discovery (coming soon)

    Section 6: Session Management

    Lecture 50 Session management introduction

    Lecture 51 Session Isolation

    Lecture 52 Plugins / Connectors

    Lecture 53 RDP session

    Lecture 54 SSH session

    Lecture 55 LAB : SSH session (coming soon)

    Lecture 56 Workflows (1/4)

    Lecture 57 Workflows (2/4)

    Lecture 58 Workflows (3/4)

    Lecture 59 Workflows (4/4)

    Lecture 60 LAB : Workflows (coming soon)

    Section 7: Audit & Compliance

    Lecture 61 Audit & Compliance introduction

    Lecture 62 Session Recording

    Lecture 63 LAB : Session recording (coming soon)

    Lecture 64 Session audit

    Lecture 65 Session monitoring

    Lecture 66 Reporting (1/2)

    Lecture 67 Reporting (2/2) (coming soon)

    Lecture 68 LAB : Reporting (coming soon)

    Section 8: Risk & Alerting

    Lecture 69 Risk & Alerting introduction

    Lecture 70 SIEM Integration

    Lecture 71 Alerting

    Lecture 72 Risk scoring

    Lecture 73 Automatic remediation

    IAM consultant / engineer,PAM consultant / engineer,IT professionals,IT and Cybersecurity students,Information Security Professional,CISO