Instructor Led Training

Please explore our catalog. We are also able to deliver any of the courses in the catalog on site and customized to meet your organization's needs. Alternatively, many of our courses are offered as public (open enrollment) courses at our own training facilities as well as Virtual Classrooms.

Instructor-led

× This was added successfully to your dashboard. Click here to view your dashboard.

On-demand Privileges Manager (OPM) Install and ConfigureInstructor Led Training

In *NIX environments, administrative privileges tend to be an all or nothing trade off. With a need for privileged users to maintain critical systems but little control over how privileged access rights are used, organizations are often forced to grant default permanent, continuous and anonymous super-user privileges to users who may or may not be trusted.
× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Privileged Account Security (PAS) AdministrationInstructor Led Training

The CyberArk Privileged Account Security (PAS) Administration course covers CyberArk’s core PAS Solution: Enterprise Password Vault (EPV), Privileged Session Management (PSM) solutions, and Privileged Threat Analytics (PTA). CyberArk administrators, or ‘Vault Admins’, gain extensive hands-on experience in administering the core PAS Solution using our step-by-step exercise guide and dedicated lab environment.

 

× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Privileged Account Security (PAS) Install and ConfigureInstructor Led Training

The Privileged Account Security (PAS) Install and Configure course covers CyberArk’s Enterprise Password Vault (EPV) and Privileged Session Manager (PSM) solutions, including components Central Policy Manager, Password Vault Web Access, Disaster Recovery, PSM SSH Proxy and Backup and Restore.

× This was added successfully to your dashboard. Click here to view your dashboard.

EPM FundamentalsInstructor Led Training

In the Endpoint Privilege Manager Fundamentals course students will learn to apply Least Privilege principles with CyberArk EPM. Students will learn about the various deployment architectures of the product, deploy the required agent to endpoints, configure some select applications using EPM Server, learn about roll-out best practices and best practices.
× This was added successfully to your dashboard. Click here to view your dashboard.

AIM for Vault AdminsInstructor Led Training

The Application Identity Manager (AIM) course is designed to deliver critical insight and knowledge on how to secure application account passwords and remove hard-coded credentials using CyberArk’s Application Identity Manager (AIM) solution. 

× This was added successfully to your dashboard. Click here to view your dashboard.

Conjur FundamentalsInstructor Led Training

The Conjur Fundamentals course covers CyberArk’s Conjur solutions to solve critical security challenges within cloud infrastructure and DevOps workflows. In this course, students will learn how to secure enterprise infrastructure and gain hands-on experience in configuring each Conjur component, using our step-by-step exercise guide and dedicated lab environment.
× This was added successfully to your dashboard. Click here to view your dashboard.

CPM Plugin & PSM Connector DevelopmentInstructor Led Training

This course provides the participant with a technical introduction to the CPM PMTerminal plugins development as well as the creation of Universal Connection Components.
× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Red Team TTPInstructor Led Training

The CyberArk Red Team Tools Tactics and Procedures (TTP) training provides interactive hands-on training to introduce your Blue and Red-Team to common TTPs utilized by adversaries.
× This was added successfully to your dashboard. Click here to view your dashboard.

Privileged Threat Analytics (PTA) FundamentalsInstructor Led Training

This course provides the participant with a deep technical understanding of the Privileged Threat Analytics (PTA) product. The course includes sessions about deployment, architecture as well as troubleshooting and configuration.

Global Certification

× This was added successfully to your dashboard. Click here to view your dashboard.

Guardian WorkshopInstructor Led Training

Recipients of this certification have proven their advanced skills with the various CyberArk solutions and their ability to combine organizational architecture with privileged account security strategy.

By the end of the certification process the engineer will be able to provide basic consulting services for CyberArk deployments.