CyberArk Fundamentals
This course will teach you how to implement CyberArk product sets for PAM and Identity.
Identity is the new perimeter and old methods are not effective. In this course, CyberArk Fundamentals, you’ll learn to implement CyberArk product sets for PAM and Identity. First, you’ll explore identity and privilege access challenges. Next, you’ll discover how to implement PAM products. Finally, you’ll learn how to implement Identity products. When you’re finished with this course, you’ll have the skills and knowledge of CyberArk fundamentals needed to implement CyberArk product sets for PAM and Identity.
Author Name: Matt Conran
Author Description:
Matt Conran has more than 24 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Network & Security Architect and successfully delivered major global greenfield service provider and data center networks. Core skill set includes advanced data center, service provider, security, and virtualization technologies. He loves to travel and has a passion for landscape photography.
There are no reviews yet.