In the Privileged Access Management (PAM) course, students will learn what PAM is, why it is used, and best practices for its uses. With hands-on labs, students will gain skills needed to ensure the security of access to an organization’s privileged information.
Module 3: "Current Maturity" and Understanding PAM
This course is designed to introduce to you Thycotic’s Privileged Access Management (PAM) solution.
By the end of the course, students should be able to:
1. Why do organizations need to manage access?
2. Understand your business risk and what PAM means in your environment.
3. What's the delta between your original understanding of PAM and the reality?
The major concepts used in the course will be knowledge of account management and access management for those accounts.
This course is part of a Career Path:
No items found.
I have a bachelor’s degree in network communications and Management, and I have a master’s degree in Cyber Security and Information Assurance. I also have several information security certifications starting with the ISC2 CISSP, EC-Council Certified Ethical Hacker v9 312-50, EC-Council Computer Hacking Forensic Investigator, eLearnSecurity Junior Penetration Tester, ISC2 SSCP, CompTIA – Advanced Security Practitioner, CompTIA Linux+, CompTIA Security+, Splunk Certified Power User, and CompTIA A+ 220-801.
Certificate of Completion
Complete this entire course to earn a Privileged Access Management Certificate of Completion