Choose from a variety of learning options, including virtual classroom, live face-to-face or self-paced classes and online tutorials.
The benefits add up
Optimize your investment
Learn the fundamentals of CyberArk solutions before project kickoff so you can hit the ground running.
Expedite your journey
Lower the learning curve and see results sooner with hands-on experience.
Move onto advanced courses once you’ve gained some basic working experience with the solutions.
Set your team up for success
Make the most of your solution with unlimited self-paced training, instructor-led training credits, a catalog of predefined outcomes, and counseling from a Customer Success Manager.
Hit the ground running with CyberArk solutions. Administrator courses teach skills and best practices to configure and manage your CyberArk solutions.
Equip experienced IT administrators and deployment experts with Installation and Configuration courses that teach how to securely deploy CyberArk solutions.
Learn how to automate tasks using Rest APIs and to create custom plugins and extensions.
Help users get familiar with the benefits of CyberArk solutions and how to access the assets, data and infrastructure that’s protected and managed by CyberArk.
Empower your team with the knowledge and skills for effective program execution. Free online courses from CyberArk University provide an overview of the threat landscape and how CyberArk solutions help.
Customers and partners have access to short and free tutorials to supplement courses and provide quick references.
CyberArk University provides world-class training in classroom and virtual delivery formats – including a lab environment for hands-on learning.
Self paced training
Cost-effective and on-demand courses enhance proficiency and hands-on experience from anywhere.
Configure your solution to prevent, stop and limit the common identity attack chain.
Workforce identity administration
Explore Zero Trust best practices and get firsthand experience on how to configure, deploy and manage Adaptive Multi-factor Authentication, Single Sign-On and Lifecycle Management.
Privileged access manager administration
Gain the knowledge and skills required to administer, monitor, and troubleshoot a PAM implementation.
Endpoint privilege manager fundamentals
Get the basics and hands-on experience to implement and secure endpoints across the enterprise – from servers to workstations in and out the network.
Conjur and credential provider fundamentals
Administrators, developers, and security experts gain hands-on experience in configuring Secrets Manager solutions, including a dedicated testing environment.