3.1 Discovery
Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
or
Already have an account? Sign In »

Privileged Access Management
In the Privileged Access Management (PAM) course, students will learn what PAM is, why it is used, and best practices for its uses. With hands-on labs, students will gain skills needed to ensure the security of access to an organization’s privileged information.
Instructed By
Similar Content