CyberArk Fundamentals
This course will teach you how to implement CyberArk product sets for PAM and Identity.
Identity is the new perimeter and old methods are not effective. In this course, CyberArk Fundamentals, you’ll learn to implement CyberArk product sets for PAM and Identity. First, you’ll explore identity and privilege access challenges. Next, you’ll discover how to implement PAM products. Finally, you’ll learn how to implement Identity products. When you’re finished with this course, you’ll have the skills and knowledge of CyberArk fundamentals needed to implement CyberArk product sets for PAM and Identity.
Author Name: Matt Conran
Author Description:
Matt Conran has more than 24 years of networking industry with entrepreneurial start-ups, government organizations and others. He is a lead Network & Security Architect and successfully delivered major global greenfield service provider and data center networks. Core skill set includes advanced data center, service provider, security, and virtualization technologies. He loves to travel and has a passion for landscape photography.
Table of Contents
- Course Overview
1min - Highlighting Identity and Privilege Controls
38mins - Managing Privilege Access
34mins - Identity and Access Management
32mins - Applying Identity and Privileges
29mins
There are no reviews yet.