fbpx

Privileged Access Management (PAM) Administration

This course provides the participant with the knowledge and skills required to administer, monitor, and troubleshoot an existing PAM implementation. The course includes presentations on PAM architecture, password management, and PSM, along with software concepts including monitoring and troubleshooting.

Register your interest in this course here
Register your interest now

  • 25
    Mar
    4 days, Mon, Tue, Wed & Thu 9:00 AM – 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 25 Mar 09:00 - Mon 25 Mar 17:00
    Virtual - AUS
    Session 2
    Tue 26 Mar 09:00 - Tue 26 Mar 17:00
    Virtual - AUS
    Session 3
    Wed 27 Mar 09:00 - Wed 27 Mar 17:00
    Virtual - AUS
    Session 4
    Thu 28 Mar 09:00 - Thu 28 Mar 17:00
    Virtual - AUS
    • $5,876.00 excl. GST
  • 20
    May
    4 days, Mon, Tue, Wed & Thu 9:00 AM – 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 20 May 09:00 - Mon 20 May 17:00
    Virtual - AUS
    Session 2
    Tue 21 May 09:00 - Tue 21 May 17:00
    Virtual - AUS
    Session 3
    Wed 22 May 09:00 - Wed 22 May 17:00
    Virtual - AUS
    Session 4
    Thu 23 May 09:00 - Thu 23 May 17:00
    Virtual - AUS
    • $5,876.00 excl. GST
  • 24
    Jun
    4 days, Mon, Tue, Wed & Thu 9:00 AM – 5:00 PM
    Virtual - AUS
    Session information
    Sessions
    Session 1
    Mon 24 Jun 09:00 - Mon 24 Jun 17:00
    Virtual - AUS
    Session 2
    Tue 25 Jun 09:00 - Tue 25 Jun 17:00
    Virtual - AUS
    Session 3
    Wed 26 Jun 09:00 - Wed 26 Jun 17:00
    Virtual - AUS
    Session 4
    Thu 27 Jun 09:00 - Thu 27 Jun 17:00
    Virtual - AUS
    • $5,876.00 excl. GST

Description

  • Describe the system architecture and flows
  • Successfully manage passwords (verification, change, and reconciliation)
  • On-board accounts using Automatic Accounts Discovery and the Password Upload Utility
  • Configure PSM session isolation and monitoring
  • Monitor sessions, view recorded sessions
  • Use the PTA to monitor privileged account activity in the network
  • Describe how connections through a PSMP can be established
  • Modify Master Policy settings
  • Produce reports on various system and user activities
  • Monitor the CyberArk implementation
  • Describe and configure the various logs that are available to troubleshoot problems
  • Utilize the knowledge base and other available resources to resolve problems
  • Perform common administrative tasks

Datasheets

Translate »