Courses

Self-Paced Courses

× This was added successfully to your dashboard. Click here to view your dashboard.

EPM Fundamentals - Self-PacedCourse

The Endpoint Privilege Manager (EPM) Fundamentals course provides a technical introduction to the EPM solution. The course includes discussions of the EPM architecture along with software concepts including administration, policy creation, monitoring, and troubleshooting. The EPM Fundamentals course will prepare each participant with the knowledge and hands-on experience to implement the EPM solution into the enterprise environment.
$ 1200.00 USD

Enroll

× This was added successfully to your dashboard. Click here to view your dashboard.

Introduction to CyberArk Privileged Access SecurityCourse

The course Introduction to CyberArk Privileged Access Security is designed for anyone who is interested in learning about privileged account security. It is highly recommended for any professional who will be part of a CyberArk project.

The course is a free on-line course.

Free
× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk PAS Administration - Self-PacedCourse

The CyberArk Privileged Access Security (PAS) Administration course covers CyberArk’s core PAS Solution: Enterprise Password Vault (EPV), Privileged Session Management (PSM) solutions, and Privileged Threat Analytics (PTA). CyberArk administrators, or ‘Vault Admins’, gain extensive hands-on experience in administering the core PAS Solution using our step-by-step exercise guide and dedicated lab environment.

 

$ 2400.00 USD

Enroll

× This was added successfully to your dashboard. Click here to view your dashboard.

On-demand Privileges Manager (OPM) Install and Configure - Self-pacedCourse

In *NIX environments, administrative privileges tend to be an all or nothing trade off. With a need for privileged users to maintain critical systems but little control over how privileged access rights are used, organizations are often forced to grant default permanent, continuous and anonymous super-user privileges to users who may or may not be trusted.
$ 400.00 USD

Enroll

Idaptive eLearning

× This was added successfully to your dashboard. Click here to view your dashboard.

Idaptive OverviewCourse

A 2 minute overview of Idaptive's key functions.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Customizing Your Idaptive TenantCourse

This 8 minute course contains short videos showing how to customize your tenant URL, your login suffix, your Idaptive portal, and your system generated email templates.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Working with the Idaptive DirectoryCourse

This course shows how to add, view and work with users in the Idaptive Directory.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Working with the Idaptive ConnectorCourse

This short video course shows how to prepare for, download, install and configure the Idaptive Connector.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Working with RolesCourse

This course explains how to view, add, create and change membership in Roles.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Working with PoliciesCourse

This course explains how to view, modify and create policies.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Configuring Basic Single Sign-onCourse

This course introduces CyberArk Idaptive single-sign on (SSO) basic procedures.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Configuring Advanced Single Sign-onCourse

This course demonstrates procedures for several advanced single sign-on configurations.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Configuring Office 365Course

This course will help you learn more about installing Office 365 for automatic provisioning and de-provisioning.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Configuring Multi-Factor Authentication (MFA)Course

This course introduces you to using CyberArk Idaptive Multi-Factor Authentication.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Setting Up Multi-Factor Authentication FactorsCourse

This course shows you how to enable MFA factors on the admin side so that users can configure them to use as methods of authentication.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Using Idaptive MFA before VPNCourse

This course provides resources for configuring Idaptive multi-factor-authentication in front of VPN and VDI access.
Free
× This was added successfully to your dashboard. Click here to view your dashboard.

Using Idaptive on Windows DevicesCourse

This course demonstrates the procedures for implementing Idaptive with Windows for endpoint security management.
Free