Free

Privileged Access Management

In the Privileged Access Management (PAM) course, students will learn what PAM is, why it is used, and best practices for its uses. With hands-on labs, students will gain skills needed to ensure the security of access to an organization’s privileged information.
0
58
M
Time
intermediate
difficulty
0
ceu/cpe

Course Content

2.4 Technology

8m

Module 2: Starting Your PAM Journey
2.3 Where to Start Your PAM Journey

8m

Module 2: Starting Your PAM Journey
1.1 Course Introduction

5m

Module 1: Introduction
3.2 Classification System

12m

Module 3: "Current Maturity" and Understanding PAM
3.1 Discovery

9m

Module 3: "Current Maturity" and Understanding PAM
Course Description

This course is designed to introduce to you Thycotic’s Privileged Access Management (PAM) solution.

Course Goals

By the end of the course, students should be able to:

1. Why do organizations need to manage access? 2. Understand your business risk and what PAM means in your environment. 3. What's the delta between your original understanding of PAM and the reality?

Prerequisites

The major concepts used in the course will be knowledge of account management and access management for those accounts.

This course is part of a Career Path:
No items found.

Instructed by

Instructor
Mario Bardowell

I have a bachelor’s degree in network communications and Management, and I have a master’s degree in Cyber Security and Information Assurance. I also have several information security certifications starting with the ISC2 CISSP, EC-Council Certified Ethical Hacker v9 312-50, EC-Council Computer Hacking Forensic Investigator, eLearnSecurity Junior Penetration Tester, ISC2 SSCP, CompTIA – Advanced Security Practitioner, CompTIA Linux+, CompTIA Security+, Splunk Certified Power User, and CompTIA A+ 220-801.

Provider
Cybrary Logo
Certification Body
Certificate of Completion

Complete this entire course to earn a Privileged Access Management Certificate of Completion