CyberArk Privileged Account Security (PAS) Administration


CyberArk Privileged Account Security (PAS) Administration Certification Training Course Overview

CyberArk Privileged Account Security (PAS) Administration course includes CyberArk’s core PAS Solution: Enterprise Password Vault (EPV), Privileged Session Management (PSM) solutions, and Privileged Threat Analytics (PTA). This course will teach you how to gain extensive hands-on experience in administering the core PAS Solution using our step-by-step exercise guide and dedicated lab environment. You will also get the skills required to administer, monitor, and troubleshoot an existing PAS implementation.

Audience

Anyone who will be responsible for the Administration of the PAS solution


CyberArk Privileged Account Security (PAS) Administration (32 Hours) Download Course Contents

Live Virtual Classroom (Instructor-Led)

Fee : On Request
9 AM - 5 PM (Flexible Time Slots for 4 hours option)




May
8 Hours/Day
03-06
09-12
10-13
17-20
03-12
09-18
10-19
17-26
June
8 Hours/Day
07-10
13-16
14-17
21-24
07-16
13-22
14-23
21-30
July
8 Hours/Day
05-08
11-14
12-15
05-14
11-20
12-21
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request

Special Solutions for Corporate Clients! Click here

Hire Our Trainers! Click here

Request More Information

Course Prerequisites

  • Fundamental knowledge of networking
  • Basic knowledge of Windows administration


  • Describe the system architecture and flows
  • Successfully manage passwords (verification, change, and reconciliation)
  • On-board accounts using Automatic Accounts Discovery and the Password Upload Utility
  • Configure PSM session isolation and monitoring
  • Monitor sessions, view recorded sessions
  • Use the PTA to monitor privileged account activity in the network
  • Describe how connections through a PSMP can be established
  • Modify Master Policy settings
  • Produce reports on various system and user activities
  • Monitor the CyberArk implementation
  • Describe and configure the various logs that are available to troubleshoot problems
  • Utilize the knowledge base and other available resources to resolve problems
  • Perform common administrative tasks