Privileged Access Management:Mastering Security Fundamentals

Posted By: ELK1nG

Privileged Access Management:Mastering Security Fundamentals
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 867.59 MB | Duration: 2h 25m

Strengthening Security Foundations: A Comprehensive Course on Privileged Access Management

What you'll learn

Importance of PAM

Types of accounts

What are privileged accounts

Privileged Accounts - A target for cyber criminals

Different Types of Data Loss - PII, IP and Confidential Information

Ransomware

Compliance Failures Related to Regulations, Laws, or Internal Standards

Crypto Mining

PAM in case of COTS Applications

PAM in case of Servers

PAM in case of Databases

PAM in Case of Network Devices, Endpoints, IOT and ICS

Cloud Security: Protecting Your Organization from Data Breaches

Protecting Cloud Infrastructure

Securing Cloud Management Console and Root Accounts

Securing API Access Keys in the Cloud

Securing SAAS Applications

Securing the DevOps Pipeline

Building a Strong Foundation: Initiating a Privileged Access Security Project

Four Actions which Security Leadership Must Have For PAM Project

PAM Tool Investment

Requirements

Basic knowledge of IT

Basic understanding for information security concepts

Description

Privileged Access Management (PAM) is a critical component of modern cybersecurity. PAM ensures that the access to sensitive information and critical infrastructure is limited to authorized individuals only. This course, "Privileged Access Management: Mastering Security Fundamentals" , provides a comprehensive overview of the essential concepts, and techniques needed to secure privileged access to critical assets.The course covers the key concepts of PAM, including the definition of privileged accounts, the risks associated with unsecured access, and the principles of least privilege. You will also learn about the essential components of PAM, such as password management, access controls, and monitoring tools.The course is designed to equip you with the knowledge/skills needed to implement and manage PAM solutions effectively. You will learn how to identify and manage privileged accounts, implement password policies, and configure access controls. The course will also cover the best practices for monitoring and auditing privileged access to ensure compliance with security standards.This course is suitable for cybersecurity professionals, system administrators, and anyone responsible for managing privileged access to critical assets. By the end of this course, you will have the knowledge and skills to implement effective PAM solutions to secure your business against unauthorized access.By enrolling in this course, you will gain a competitive advantage in the job market by acquiring the essential skills and knowledge needed to implement and manage PAM solutions effectively. This course is an excellent opportunity for anyone looking to enhance their cybersecurity skills and take their career to the next level

Overview

Section 1: Introduction

Lecture 1 Importance of PAM

Lecture 2 Types of Accounts

Lecture 3 What are Privileged Accounts

Lecture 4 Privilege account locations

Lecture 5 Why Prime target for hackers

Section 2: Section 2: Risks of Unsecured Privileged Access

Lecture 6 Different Types of Data Loss - PII, IP and Confidential Information

Lecture 7 Ransomware

Lecture 8 Compliance Failures Related to Regulations, Laws, or Internal Standards

Lecture 9 Crypto Mining

Section 3: Security of Privilege Accounts for On-Premise Environment

Lecture 10 PAM in case of COTS Applications

Lecture 11 PAM in case of Servers

Lecture 12 PAM in case of Databases

Lecture 13 PAM in Case of Network Devices, Endpoints, IOT and ICS

Section 4: Security of Privilege Accounts for Cloud Environment

Lecture 14 Cloud Security: Protecting Your Organization from Data Breaches

Lecture 15 Protecting Cloud Infrastructure

Lecture 16 Securing Cloud Management Console and Root Accounts

Lecture 17 Securing API Access Keys in the Cloud

Lecture 18 Securing SAAS Applications

Lecture 19 Securing the DevOps Pipeline

Section 5: Building a Strong Foundation: Initiating a Privileged Access Security Project

Lecture 20 Examining the Attack Life Cycle

Lecture 21 Strategic Questions for Privileged Access Security

Lecture 22 Action 1: Assessment of on-premise and Cloud Infra

Lecture 23 Action 2: Classify types of privileged access by risk

Lecture 24 Action 3: Evaluate existing process effectiveness

Lecture 25 Action 4: Prioritize actions and where to start

Lecture 26 Action 5: Implement Right Blend of Controls

Lecture 27 Action 6 : Creating Effective Cross-Functional Teams

Lecture 28 Action 7: Select a privileged access security platform

Section 6: Extra learnings

Lecture 29 Secure Infrastructure Accounts and Limit Lateral Movement

Lecture 30 PAM Tool Investment

Lecture 31 Four Actions which Security Leadership Must Have For PAM Project

Section 7: Final Section

Lecture 32 Conclusion

IT Engineer,Security Engineer,Security Analyst,IAM engineer,IAM Manager,Security Manager,System Admin