Impact Live 2021 - June 8 & 9. Shape the future of Identity Security! Register Now!

PAM Boot Camp 2nd Edition On-Demand

A Privileged Access Management Course in 4 Short Virtual Sessions.

PAM Boot Camp 2nd Edition On-Demand

A Privileged Access Management Course in 4 Short Virtual Sessions.

Four 30-minute Virtual Training Sessions to Help You Start a PAM Project

Privileged accounts can be found in every networked device, database, application, and server on-premises, in cloud and ICS environments, and through the DevOps pipeline. Privileged users have the “keys to the kingdom” and, in the case of a cyberattack or data breach, privileged credentials can be used to cause catastrophic damage to a business.

Nowadays, Privileged Access Management (PAM) is a key component of any cyber security program. If you are on the road to a implementing a PAM solution, CyberArk offers you a quick but thorough learning path to a successful PAM program

shirt

Our special thank-you – a branded CyberArk t-shirt*

Register only once and access all 4 sessions

Earn 2 CPE credits*.

*This offer is valid for IT security professionals located in the US and Canada only.

** IT professionals must VIEW all 4 sessions (on-demand).

PAM 101: Learn the Basics

On-demand

Understand the foundational elements within the CyberArk PAM solution. Learn standard and advanced PAM controls for mitigating risk in 3 critical areas: preventing credential theft, stopping lateral and vertical movement, limiting privilege escalation and abuse.

An Introduction to PAM as a Service

On-demand

A quick guide through CyberArk Privilege Cloud, our PAM as SaaS offering designed to minimize on-premises infrastructure. Review of the back-end architecture, use cases, and a repeatable 3-step process to plan, deploy and scale your Privilege Cloud solution.

Secure Privilege for Cloud Environments

On-demand

Deep dive into best practices and tools for managing privileged access in the cloud, including securing human credentials used to access DevOps tools and cloud admin consoles, as well as credentials used by applications and other non-human identities.

securing privilege on endpoints

On-demand

We will share best practices for combatting credential theft attacks and protecting privileged access on endpoints. This session will also showcase practical ways to implement the principal of least privilege across Windows and Mac workstations.

*This offer is valid for IT security professionals located in the US and Canada only.

** IT professionals must VIEW all 4 sessions (on-demand).

REGISTER NOW