Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
Already have an account? Sign In »
Hey, everyone, welcome back of the course. So in the last video, we wrapped up our labs for this particular course again. If you haven't completed those grand policies video, go back to those videos in the last module as well. Let's go to the resource is section of the course and be sure to download the step by step guides for the labs
and this, really? We're just gonna wrap up the course. So what did we cover in this course? What we talked about what privileged access management actually is. We also talked about why it's even important foreign organization. We talked about some of the benefits to it as well as some of the best practices. We also talked about privileged access management in relation to active directory.
And then we went through performed several labs. So again, if you haven't performed those yet, be sure to download this step by step guides
from the resource is section of the course and go through those. So where can we go from here? Well, on the cyber website, we're building out a lot more identity access management content. But right now you get the filming of this video you can go to the AWS version of identity and access management and also
get some hands on experience there as well. So as always, I want to thank you for taking this course, and I'll see you in the next one.
Course Assessment - Privileged Access Management