Privileged Identity Management
About The Course
This training will introduce the participants on the importance of Privileged Identity Management and how it forms a crucial part of the access control mechanism in an enterprise. We shall first look at what are Privileged IDs and why are they such a major issue. How do APTs leverage these IDs to penetrate deep into the network and exfiltrate corporate information assets out of the network. We then look at how Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization. The participant will get to know how does a PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.
What is Privilege Identity Management (PIM)
Privileged Identity Management (PIM) is a domain within Identity Management focused on the special requirements of powerful accounts within the IT infrastructure of an enterprise. It is frequently used as an Information Security and governance tool to help companies in meeting compliance regulations and to prevent internal data breaches through the use of privileged accounts. Privileged identities can be automated to follow pre-determined or customized policies and requirements for an organization or industry.
The integrated enterprise policy-based solution helps to securely manage and log all privileged accounts and activities associated with data center management, from on premises to off-site, all the way to the cloud. The PIM solution offers a central point of control for protecting target systems accessed by privileged users and accounts.
Who should attend this training?
- IT Managers
- Database Administrators
- Legal Advocates
- Incident Management Team
Why should you attend?
Privileged identity management solutions can guard against undocumented access to configuration settings and private data, enforce the provisions of IT service management practices such as ITIL[4], and provide definitive audit trails to prove compliance with standards such as HIPAA and PCI-DSS
Prerequisites
Nice to have working knowledge of access controls and authorized actions
Table of Contents
Mohammed Harbi,student
I liked the instructor way for more illustration and the class was very interesting.
Yazeed, Senior Analyst
One of the best instructor, I have ever met.
Ali Al-Qahtani,
Thank you faculty. He has really gave us an excellent course by covering the material well.
Moataz Allami
Faculty is very knowledgeable instructor, enthusiastic and helpful.