Instructor Led Training

Please explore our catalog. We are also able to deliver any of the courses in the catalog on site and customized to meet your organization's needs. Alternatively, many of our courses are offered as public (open enrollment) courses at our own training facilities as well as Virtual Classrooms.

Instructor-led

× This was added successfully to your dashboard. Click here to view your dashboard.

Threat Detection and Analysis for Security OperatorsInstructor Led Training

The Threat Detection and Analysis for Security Operators course is designed to provide security personnel with practical training on how to handle security events in the CyberArk Privileged Access Security environment.

× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Automation with the RestAPIInstructor Led Training

This course includes the following topics: Shell Scripting Concepts Basics of RestAPI Prototyping Complex Automations, Using Community Developed Tools, Securing Automation Scripts
× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Privileged Access Management (PAM) AdministrationInstructor Led Training

The CyberArk Privileged Access Management (PAM) Administration course covers CyberArk’s core PAM Solution: Enterprise Password Vault (EPV), Privileged Session Management (PSM) solutions, and Privileged Threat Analytics (PTA). CyberArk administrators, or ‘Vault Admins’, gain extensive hands-on experience in administering the core PAS Solution using our step-by-step exercise guide and dedicated lab environment.

 

× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Privileged Access Management (PAM) Install and ConfigureInstructor Led Training

The Privileged Access Management (PAM)  Install and Configure course covers CyberArk’s Enterprise Password Vault (EPV) and Privileged Session Manager (PSM) solutions, including components Central Policy Manager, Password Vault Web Access, Disaster Recovery, PSM SSH Proxy and Backup and Restore.

× This was added successfully to your dashboard. Click here to view your dashboard.

Introduction to CyberArk Identity Administration.Instructor Led Training

Designed for system administrators and technical implementation professionals, this lab based, hands-on course provides participants with a comprehensive understanding of Zero-Trust best practices and all the necessary steps to configure, deploy and successfully manage your new Idaptive Next-Gen Access Platform.  This course is delivered virtually via WebEX.

 

× This was added successfully to your dashboard. Click here to view your dashboard.

Credential Provider (CP) FundamentalsInstructor Led Training

The Credential Provider (CP) Fundamentals course covers CyberArk's Credential Provider solutions to solve critical security challenges within enterprise applications. Administrators, developers, and security experts gain hands-on experience in configuring Secrets Manager solutions, using our step-by-step exercise guide and dedicated lab environment. 

 

× This was added successfully to your dashboard. Click here to view your dashboard.

Conjur FundamentalsInstructor Led Training

The Conjur Fundamentals course covers CyberArk's Conjur solution to solve critical security challenges within enterprise applications, cloud infrastructure, and DevOps workflows. Administrators, developers, and security experts gain hands-on experience in configuring each Conjur component, using our step-by-step exercise guide and dedicated lab environment.

 

× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Privileged Cloud (CPC) Administration - For CustomersInstructor Led Training

The CyberArk Privilege Cloud (CPC) Administration course covers CyberArk’s Privilege Cloud architecture and core concepts. New CyberArk administrators or ‘Vault Admins’ will gain extensive hands-on experience in administrating the Privilege Cloud product by using our step-by-step exercise guide and dedicated lab environment.

× This was added successfully to your dashboard. Click here to view your dashboard.

Endpoint Privilege Manager (EPM) FundamentalsInstructor Led Training

The Endpoint Privilege Manager (EPM) Fundamentals course provides a technical introduction to the EPM solution. The course includes discussions of the EPM architecture along with software concepts including administration, policy creation, monitoring, and troubleshooting. The EPM Fundamentals course will prepare each participant with the knowledge and hands-on experience to implement the EPM solution into the enterprise environment.

× This was added successfully to your dashboard. Click here to view your dashboard.

On-demand Privileges Manager (OPM) Install and ConfigureInstructor Led Training

In *NIX environments, administrative privileges tend to be an all or nothing trade off. With a need for privileged users to maintain critical systems but little control over how privileged access rights are used, organizations are often forced to grant default permanent, continuous and anonymous super-user privileges to users who may or may not be trusted.

× This was added successfully to your dashboard. Click here to view your dashboard.

CyberArk Red Team TTPInstructor Led Training

The CyberArk Red Team Tools Tactics and Procedures (TTP) training provides interactive hands-on training to introduce your Blue and Red-Team to common TTPs utilized by adversaries.
× This was added successfully to your dashboard. Click here to view your dashboard.

CPM Plugin & PSM Connector DevelopmentInstructor Led Training

This course provides the participant with a technical introduction to the CPM PMTerminal plugins development as well as the creation of Universal Connection Components.

Global Certification

× This was added successfully to your dashboard. Click here to view your dashboard.

Guardian WorkshopInstructor Led Training

Recipients of this certification have proven their advanced skils with the various CyberArk solutions and their ability to combine organization architecture with privileged account security strategy. 

Cost of the workshop: 3 CyberArk Training Days per attendee