Privileged Identity Management

Identity Management

About The Course

This training will introduce the participants on the importance of Privileged Identity Management and how it forms a crucial part of the access control mechanism in an enterprise. We shall first look at what are Privileged IDs and why are they such a major issue. How do APTs leverage these IDs to penetrate deep into the network and exfiltrate corporate information assets out of the network. We then look at how Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization. The participant will get to know how does a PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

What is Privilege Identity Management (PIM)

Privileged Identity Management (PIM) is a domain within Identity Management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an Information Security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts. Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization or industry.

The integrated enterprise policy-based solution helps to securely manage and log all privileged accounts and activities associated with data center management, from on premises to off-site, all the way to the cloud. The PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

Who should attend this training?

  • IT Managers
  • Database Administrators
  • Legal Advocates
  • Incident Management Team

Why should you attend?

Privileged identity management solutions can guard against undocumented access to configuration settings and private data, enforce the provisions of IT service management practices such as ITIL[4], and provide definitive audit trails to prove compliance with standards such as HIPAA and PCI-DSS

Prerequisites

Nice to have working knowledge of access controls and authorized actions

Table of Contents

Day 1
Day 2
Day 3

Register for a training

Previous TrainingNAC for wired and wireless
Next TrainingWeb Application Firewall
Mohammed Harbi,student

I liked the instructor way for more illustration and the class was very interesting.

Yazeed, Senior Analyst

One of the best instructor, I have ever met.

Ali Al-Qahtani,

Thank you faculty. He has really gave us an excellent course by covering the material well.

Moataz Allami

Faculty is very knowledgeable instructor, enthusiastic and helpful.