Privileged Identity Management

Learn the importance of Privileged Identity Management in an enterprise

This training will introduce the participants on the importance of Privileged Identity Management and how it forms a crucial part of the access control mechanism in an enterprise. We shall first look at what are Privileged IDs and why are they such a major issue. How do APTs leverage these IDs to penetrate deep into the network and exfiltrate corporate information assets out of the network. We then look at how Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization. The participant will get to know how does a PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

What is Privilege Identity Management (PIM)

Privileged Identity Management (PIM) is a domain within Identity Management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an Information Security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts. Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization or industry.

The integrated enterprise policy-based solution helps to securely manage and log all privileged accounts and activities associated with data center management, from on premises to off-site, all the way to the cloud. The PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

Who should attend this training?

  • IT Managers
  • Database Administrators
  • Legal Advocates
  • Incident Management Team

Why should you attend?

Privileged identity management solutions can guard against undocumented access to configuration settings and private data, enforce the provisions of IT service management practices such as ITIL[4], and provide definitive audit trails to prove compliance with standards such as HIPAA and PCI-DSS

Prerequisites

Nice to have working knowledge of access controls and authorized actions

Course Duration

2 Days

Course Contents

  1. Presentation of PIM solution: Overview about the company, different solutions and description of PIM
  2. Discussion on PIM components: Different Components that completes the PIM solution
  3. Implementation of PIM components: Implementation Steps of PIM Components. Discussion on HA and DR mode
  4. Detailed description of each components: Explanation of each component of PIM in detail
  1. Addition of Users: Users can be added in two ways; Integration with AD and Creating user in PIM solution.
  2. Creation of Safes in Client and Portal(PVWA): Creating Safe using PIM client and PIM Portal.
  3. Access to users: Creating Users and provide different level of access to Users
  4. Creating Policy: Creating policy for different assets
  5. Creating Accounts: Integrate assets in PIM and map them to created policy
  6. Password change and verification: Perform Password Change and Verification process
  7. Dual Control: Creating Approval Workflow process
  8. Event Notification Engine: Creating an Event Notification
  9. Secure Connect: Working of Secure Connect
  10. Users and Roles: Discuss on the different default user group created by PIM
  11. Audit and logs: Discuss on Reporting feature of PIM.
  12. Knowledge Sharing of Basic Issues

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content