7 hours 15 minutes

Video Transcription

Hey, everyone, welcome back of the course. So in the last video, we wrapped up our labs for this particular course again. If you haven't completed those grand policies video, go back to those videos in the last module as well. Let's go to the resource is section of the course and be sure to download the step by step guides for the labs
and this, really? We're just gonna wrap up the course. So what did we cover in this course? What we talked about what privileged access management actually is. We also talked about why it's even important foreign organization. We talked about some of the benefits to it as well as some of the best practices. We also talked about privileged access management in relation to active directory.
And then we went through performed several labs. So again, if you haven't performed those yet, be sure to download this step by step guides
from the resource is section of the course and go through those. So where can we go from here? Well, on the cyber website, we're building out a lot more identity access management content. But right now you get the filming of this video you can go to the AWS version of identity and access management and also
get some hands on experience there as well. So as always, I want to thank you for taking this course, and I'll see you in the next one.

Up Next

Privileged Access Management Fundamentals

This course will teach students about privileged access management (PAM) and why it should be used. Students will learn what privileged access management is and why it is needed.

Instructed By

Instructor Profile Image
Ken Underhill
Master Instructor at Cybrary
Master Instructor