Our CyberArk course syllabus covers all the core concepts necessary to enhance your skills and knowledge about Privileged Account Security deployment. Additionally, it also includes concepts like software aspects, password management, PAS architecture, troubleshooting, and so on. The CyberArk Online Training covers the following areas:
• Privileged Identity Management
Privileged identity management provides detailed security and audit control measures for enterprises. The module explains the method to secure, track and safeguard the privileged accounts in firms by identification of pain areas, analysis of risk, and proposal of the ideal solution.
• CyberArk Overview
This module magnifies the properties, CyberArk installation, configuration, and capabilities of CyberArk solutions with hands-on training.
• CyberArk Solution Components
In this section, you acquire the real-time knowledge required to design, develop and configure the Privileged Account Security feature. You also get to learn the installation of CyberArk components like CyberArk Vault, CyberArk Vault Client, Central Password Manager, Password Vault Web Access Manager, Privileged Session Manager.
• Overview of CyberArk functioning
It gives you insights into the functioning of CyberArk through real-time projects and use-cases.
• CyberArk Infrastructure Installation
This module explains the software and hardware requirements of servers to ensure CyberArk infrastructure installation.
• Network, Software, and Hardware requirements
• CyberArk Port awareness
• CyberArk Installation- Vault, CPM, PVWA, PSM, Vault Client
• Integration of CyberArk Active Directory
• CyberArk Engine configuration and email notification.
CyberArk Policy Configuration
You get centralized security and compliance policy overview, and real-time exposure in the configuration of CyberArk policies.
• CyberArk Policy Creation
This module gives you a picture of the fundamentals of CyberArk policy creation and the services like Scheduled Task, Master Policy, CPM Platform Policy, etc.
• CyberArk Safe Management
You can gain insights on steps to create, configure, and integrate CyberArk using Safe. You can also excel User-Access matrix approach to lead the account ranking, prioritization, LDAP, dual control configuration setting, access control management, etc.
• CyberArk Account Integration
Here, you learn about the integration of CyberArk for integration with Windows, Unix, and Linux platforms. You can also learn network device and security device overview, along with the best practices to ensure security.
• CyberArk Use Cases
The following use cases are covered in this module:
• User Onboarding and Offboarding process
• Privileged SSO (Single Sign-On)
• Reconciliation of Password
• PAM- Access privilege for user accounts
• 2FA Overview
• Dual access control
• Reporting and Auditing process
• Session recording process
• CyberArk Vault Backup
It discusses the basics of backup considerations, installation, and third-party backup systems.
• CyberArk Troubleshooting
This section helps you to learn to build, unlock, and password reset the encrypted credential password file, for the gw, pvwaapp, password manager, psmapp, psmgw, users.
13. CyberArk DR Overview
CyberArk Disaster Recovery covers the steps to work with the failovers and methods to follow for Vault disaster recovery during failovers. You get hands-on expertise to work and manage the following systems recovery processes like DR Vault, DR CPM, DR PVWA, and DR PSM.
14. Mock Test & Interview preparation
Mega Online Trainings also offer the latest set of CyberArk interview questions and resume samples to be ready to face an interview with great preparation for expected questions.