CyberArk PAS(Privileged Account Security) V11.4 - Hands-On, Self Paced & Live Online Training
CyberArk PAS(Privileged Account Security) V11.4 – Hands-On, Self Paced & Live Online Training
CyberArk Privileged Account Security(PAS) is a leading Privileged Account Security Solution designed to discover, secure, rotate and control access to privileged account passwords throughout the enterprise IT environment.
Approach to the Course:
- Complete 100% practical approach, right from explaining concepts, pre-requisites, installation of each component, environment, services and integration with full suite.
- Total Duration of the Self Paced Videos and Live classes is 50+ hours.
- Access to Curriculum (Total 5 Virtual Box Images for hands on, 48+ Videos, Running Notes) of the course for the life time. Click to Access Curriculum. #Videos 23, 42 & 48 are Free for evaluation.
- Topic Explanation followed by practical demonstration.
- Components Covered are – EPV Standalone, EPV 2 node Cluster with Storage using windows clustering and CVM, DR Vault, CPM, PVWA, PSM, PSMP, OPM, AIM, Upgrade, Integration (AD, Exchange, Splunk), Targets(Linux, DB, AWS, Windows, MS SQL Server Mgmt. Studio), Troubleshooting and support.
- Course will cover latest CyberArk PAS version 11.4
Course Overview :
Download Course Contents PDF =>
- Understand the CyberArk PAS architecture
- Overview of All CyberArk Products
- Security Layers of Enterprise Password Vault
- Pre-requisites for Installation of CyberArk Digital Vault
- Standalone Installation of CyberArk Digital Vault
- Installation Of PrivateArk Client
- Walk-through CyberArk Digital Vault, safes, configuration and log files, services, Built in Users & Groups, Safes and Vault Level Permissions, Locations, Network Areas, File Categories, PrivateArk Reports and Encryption Mechanism of the Vault.
- High Availability(cluster) deployment of CyberArk Digital Vault (using Windows Clustering and Cluster Vault Manager or CVM)
- Pre-requisites – Network, AD DS and DNS, OS Level Clustering, SAN Storage and adding storage to Cluster.
- Cluster Topology
- Cluster installation on 2 nodes
- Configuration of CyberArk Vault Cluster Services – IP, Storage, Core Services
- Defining Dependencies
- Cluster Failover Testing – All Three Scenarios
- A. Node Crash
- B. Cluster Service or Network Failure
- C. Manual Migration of CyberArk Services from One node to another & vice-a-versa
- On board new accounts of various types – AWS, Linux, Windows Local Accounts, Windows Domain Accounts, Oracle DB, Microsoft SQL Server Management Studio etc.
- Perform daily operation and maintenance tasks
- Understand features of Central Policy Manager (CPM)
- Pre-requisites and Installation of Central Policy Manager (CPM)
- Users and Safes created by CPM in the Vault
- Go-through CPM local Environment on CPM Server
- Understand features of the Password Vault Web Access (PVWA)
- Pre-requisites and Installation of the Password Vault Web Access (PVWA)
- Users and Safes created by PVWA in the Vault
- Go-through PVWA local environment on PVWA Server
- Understand features of the Privileged Session Manager (PSM)
- Pre-requisites and Installation of the Privileged Session Manager (PSM)
- Users and Safes created by PSM in the Vault
- Go-through PSM local environment on PSM Server
- LDAP(AD) integration and User management
- SMTP (Exchange), SIEM(SPLUNK), SNMP and RADIUS integration
- Manage all aspects of Master Policy (Password Management, )
- Create and Manage safes and accounts in the Vault
- Perform and test configuration at Platform level
- Understand On-Demand Privilege Manager (OPM) for Unix and the benefits it offers over the existing SUDO solution
- Understand OPM Architecture and flow
- Installation of On-Demand Privilege Manager (OPM) on a Linux Box
- On-Demand Privilege elevation using policies defined in PVWA
- Active Directory Bridging for Linux servers using OPM
- Observing Vault Configuration for OPM
- Execution of use cases for OPM (Privilege Elevation, Black-listing/White-listing Commands)
- OPM Service Management, logs and troubleshooting
- Understand Multiple Component Architecture: CPM, PVWA, and PSM
- Hands on with CPM Usages
- Hands on with DR Drill, Backup and Restore
- Privileged Session Manager SSH Proxy or PSMP – Installation and end to end Implementation with PSM SSH Proxy and AD Bridge
- Password Upload Utility
- Perform daily operation and maintenance tasks – start/stop, observe logs for various components, important configuration files and known issues with troubleshooting steps.
- Hands on in Administrative tasks like Creating and Managing Locations, Users, and Groups; Creating and Managing Safes and Owners; Transparent User Management by Managing Directory Maps, modifying External User Accounts, managing Safe Ownership for LDAP Users and Groups; Working with Master Policy and Managing Platforms.
- Observe the various types of reports like the reports generated in the Private Ark Client and the PVWA as well as the permissions needed to generate the reports and various options.
- Understand the safe design and how to build Access Control also understand how to assign permissions to various safes in order to implement the relevant level of access control for safes in the Vault.
- Account On-Boarding of large number of Accounts to the Vault in an automatic manner using Accounts Discovery Utility as well as the Password Upload Utility.
- Hands on in creation and management of Accounts On-boarding Rules to automatically onboard newly discovered accounts.
- Hands on in implementing Logon Accounts (Linux) and Reconciliation Accounts (Windows) using CPM.
- Custom File Categories
- PACLI and its usages
- Custom User Mapping and Directory Mapping
- Upgrade – Approach for V7+, V8+, V9+, V10+ to V11+ and Practical hands on in upgrading from V9+ to 11+ (with OS migration).
- Security Architects
- Security Consultants
- IT Administrators
- IT Engineers
- Vault Administrators
- Support Engineers
Pre-requisites: Basic understanding of Linux and Windows and walk through of below video:
- The global PIM market could grow at a compound annual growth rate of 32% between 2017 and 2023, according to Market Research Future (MRFR), as enterprise customers tighten their security standards.
- As of now, CyberArk now serves over 4,600+ businesses, including over half of the Fortune 500 and more than 30% of the Global 2000, Among other vendors, CyberArk is prominent:
- As per the latest Gartner Report 2018, CyberArk is in “Leaders” as well as in “Visionaries” section, leading the PIM/PAM market as trend setter. Please refer below: