Privileged Identity Management

Learn the importance of Privileged Identity Management in an enterprise

This training will introduce the participants on the importance of Privileged Identity Management and how it forms a crucial part of the access control mechanism in an enterprise. We shall first look at what are Privileged IDs and why are they such a major issue. How do APTs leverage these IDs to penetrate deep into the network and exfiltrate corporate information assets out of the network. We then look at how Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization. The participant will get to know how does a PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

What is Privilege Identity Management (PIM)

Privileged Identity Management (PIM) is a domain within Identity Management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an Information Security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts. Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization or industry.

The integrated enterprise policy-based solution helps to securely manage and log all privileged accounts and activities associated with data center management, from on premises to off-site, all the way to the cloud. The PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.

Who should attend this training?

  • IT Managers
  • Database Administrators
  • Legal Advocates
  • Incident Management Team

Why should you attend?

Privileged identity management solutions can guard against undocumented access to configuration settings and private data, enforce the provisions of IT service management practices such as ITIL[4], and provide definitive audit trails to prove compliance with standards such as HIPAA and PCI-DSS

Prerequisites

Nice to have working knowledge of access controls and authorized actions

Course Duration

2 Days

Course Contents

  • Privileged Identity Management Overview
  • Cyber-Ark Overview
  • Cyber-Ark PIM Suite
  • Basic architecture and functions of Cyber-Ark PIM
  • Cyber-Ark Installation Pre-requisites
  • Cyber-Ark Port awareness
  • EPV Installation
  • Private-Ark Client Installation
  • CPM Installation
  • PVWA Installation
  • PSM Installation
  • Active Directory Integration with Cyber-Ark
  • User and Group Creation
  • Safe Management
  • Policy Creation
  • Privileged Account Integration
  • Safe Membership
  • Privileged Account Connection
  • Workflow Creation
  • Overview of Cyber-Ark Reports
  • Overview of Cyber-Ark Session Monitoring
  • Troubleshooting of Some Known Issues

Ethical Hacking Training

This course goes deep down into depths of networking, systems, web applications, actual exploitation & helps beginners to take their confident first step towards information security field.

  • 6 Weeks Comprehensive Training
  • Built by Experienced Professionals
  • Regularly update on tools, techniques in course content