...

CyberArk IAM

د.إ500.00

“The CyberArk Hands-on Lab enhances skills and expertise in building, deploying, and configuring the Privileged Account Security Solution. Participants engage in real-world scenarios to gain hands-on experience in establishing CyberArk infrastructure, configuring authentication methods, and more. The lab provides comprehensive coverage of password management, software aspects including backup and troubleshooting, showcasing proficiency in CyberArk’s industry-leading Privileged Access Security Solution.”

Enquire Now
Category:

The CyberArk Hands on lab develops your skills and provides the expertise needed to build, deploy, and configure the Privileged Account Security Solution. CyberArk course provides a variety of options to choose from. Through real-world scenarios, participants will gain hands-on experience establishing CyberArk infrastructure, defining authentication types, and more. This lab covers password management in-depth, as well as software aspects such as backup and troubleshooting. Each level displays knowledge of CyberArk Privileged Access Security Solution, which is both innovative and industry-leading.

Course modules:

Module-1: Cyberak Component Installation

  • CyberArk Vault Installation.
  • CyberArk Active Directory Integration.
  • CyberArk Email Notification engine configure awareness.
  • Cyberark CPM Installation.
  • Cyberark PVWA Installation.
  • Cyberark PSM Installation.
  • Cyberark Vault Client Installation

 

Module-2: CyberArk Policy Creation

  • Master Policy
  • CPM Platform Policy
  • Scheduled Task
  • Services

Module-3: CyberArk Safe Management

  • Safe Creation
  • User addition (Ldap)
  • User Access Matrix
  • Dual Control
  • Object Level Access Control

Module-4: CyberArk Account Integration

  • Integrating Windows accounts
  • Integrating Linux accounts
  • Integrating network devices
  • Integrating Security devices

Module-5: CyberArk Use Cases

  • User OnBoarding
  • Privileged Single-Sign-on
  • Password Reconciliation
  • Access privilege of User Accounts in PAM
  • Authentication (2-factor) Overview
  • Dual Access Control
  • Auditing/Reporting
  • Session Recording
  • Users OffBoarding

Module-6: Backup & restore

  • Backup & restore

Module-7: Troubleshooting

  • Creating an encrypted credential password file for pvwaapp user
  • Creating an encrypted credential password file for gw user
  • Creating an encrypted credential password file for a password manager user
  • Creating an encrypted credential password file for psmapp user creating an encrypted credential password file for psmgw user
  • Unlocking and password resetting of all above-mentioned system users
  • Configuring Disaster recovery

Reviews

There are no reviews yet.

Be the first to review “CyberArk IAM”

Your email address will not be published. Required fields are marked *

Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.