Instructor-led

Instructor Led Training

CyberArk PAS Administration

The CyberArk Privileged Access Security (PAS) Administration course covers CyberArk’s core PAS Solution: Enterprise Password Vault (EPV), Privileged Session Management (PSM) solutions, and Privileged Threat Analytics (PTA). CyberArk administrators, or ‘Vault Admins’, gain extensive hands-on experience in administering the core PAS Solution using our step-by-step exercise guide and dedicated lab environment.

 

Read More

CyberArk PAS Install and Configure

The Privileged Access Security (PAS) Install and Configure course covers CyberArk’s Enterprise Password Vault (EPV) and Privileged Session Manager (PSM) solutions, including components Central Policy Manager, Password Vault Web Access, Disaster Recovery, PSM SSH Proxy and Backup and Restore.

Read More

CyberArk Application Access Manager (AAM) for Operations

The AAM for Ops course covers CyberArk's AAM solutions to solve critical security challenges within enterprise applications, cloud infrastructure, and DevOps workflows. Administrators, developers, and security experts gain hands-on experience in configuring each AAM component, using our step-by-step exercise guide and dedicated lab environment.

 

 

Read More

Endpoint Privilege Manager (EPM) Fundamentals

In the Endpoint Privilege Manager Fundamentals course students will learn to apply Least Privilege principles with CyberArk EPM. Based on a real case example, students will learn about the various deployment architectures of the product, deploy the required agent to endpoints, configure some select applications using EPM Server, learn about roll-out best practices and best practices.

Read More

On-demand Privileges Manager (OPM) Install and Configure

In *NIX environments, administrative privileges tend to be an all or nothing trade off. With a need for privileged users to maintain critical systems but little control over how privileged access rights are used, organizations are often forced to grant default permanent, continuous and anonymous super-user privileges to users who may or may not be trusted.

Read More

CPM Plugin & PSM Connector Development

This course provides the participant with a technical introduction to the CPM PMTerminal plugins development as well as the creation of Universal Connection Components.

Read More

CyberArk Red Team TTP

The CyberArk Red Team Tools Tactics and Procedures (TTP) training provides interactive hands-on training to introduce your Blue and Red-Team to common TTPs utilized by adversaries.

Read More