Prerequisites
To apply for the CyberArk Training, you need to either:
- Any individual interested in building a career in IT security can join this course.
- It will be an added benefit if you have basic coding knowledge, networking, and Windows administration skills.
Course Curriculum
Module 1: Introduction to Privileged Identity Management
- Enterprise pain areas
- Associated risk
- Expected Solution
Module 2: Overview of CyberArk
- Core properties of CyberArk solution
- Capabilities of the CyberArk solution
- Installation of CyberArk installation
- Configuring CyberArk
- Hands-on practice
Module 3: CyberArk Solution Components
- CyberArk Vault
- Password Vault Web Access Manager
- Privileged Session Manager
- Central Password Manager
- CyberArk Vault Client
Module 4: Overview of CyberArk functioning
- This module presents an in-depth look at CyberArk functioning with real-time examples and practices.
Module 5: Installation of CyberArk Infrastructure
- Installation Prerequisites (Network
- Software OS/Hardware)
- CyberArk Port awareness.
- CyberArk Vault Installation.
- CyberArk Active Directory Integration.
- CyberArk Email Notification engine configures awareness.
- Cyberark CPM Installation.
- Cyberark PVWA Installation.
- Cyberark PSM Installation.
- Cyberark Vault Client Installation.
Module 6: Overview of CyberArk Policy Configuration
- Centralized Overview of privileged accounts security and compliance policy
Module 7: Safe Management by CyberArk
- Safe Creation
- User addition (Ldap)
- User Access Matrix
- Dual Control
- Object Level Access Control
Module 8: Creation of CyberArk Policy
- Master Policy
- CPM Platform Policy
- Scheduled Task
- Services
Module 9: CyberArk Account Integration
- Windows
- Unix/Linux
- Overview of Network Device
- Overview of Security Device
Module 10: CyberArk Use Cases
- User OnBoarding
- Privileged Single-Sign-on
- Password Reconciliation
- Access privilege of User Accounts in PAM
- Authentication (2-factor) Overview
- Dual Access Control
- Auditing/Reporting
- Session Recording
- Users OffBoarding
Module 11: CyberArk Vault Backup Activity
The principles of backup considerations, vault backup installation, and third-party backup systems are covered in this section.
Module 12: CyberArk Troubleshooting
- Creating an encrypted credential password file for pvwaapp user
- Creating an encrypted credential password file for gw user
- Creating an encrypted credential password file for a password manager user
- Creating an encrypted credential password file for psmapp user creating an encrypted credential password file for psmgw user
- Unlocking and password resetting of all above-mentioned system users
Module 13: Overview of CyberArk DR
- DR Vault
- DR CPM
- DR PVWA
- DR PSM