50% found this document useful (2 votes)
2K views

Cyberark Course Content Duration: 30 Hours

This 30-hour Cyberark course content covers topics related to privileged identity management including an overview of Cyberark and its PIM suite, basic architecture and functions, installation of various Cyberark components, integration with Active Directory, user and group creation, safe management, policy creation, account integration, workflow creation, reports, session monitoring, backup/restoration, PSMP, command restriction, SNMP configuration, syslog configuration, and troubleshooting.

Uploaded by

manoj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
50% found this document useful (2 votes)
2K views

Cyberark Course Content Duration: 30 Hours

This 30-hour Cyberark course content covers topics related to privileged identity management including an overview of Cyberark and its PIM suite, basic architecture and functions, installation of various Cyberark components, integration with Active Directory, user and group creation, safe management, policy creation, account integration, workflow creation, reports, session monitoring, backup/restoration, PSMP, command restriction, SNMP configuration, syslog configuration, and troubleshooting.

Uploaded by

manoj
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 1

Cyberark Course Content

Duration: 30 Hours

1 Privileged Identity Management Overview


2 Cyber-Ark Overview
3 Cyber-Ark PIM Suite
4 Basic architecture and functions of Cyber-Ark PIM
5 Cyber-Ark Installation Pre-requisites
6 Cyber-Ark Port awareness
7 EPV Installation
8 Private-Ark Client Installation
9 CPM Installation
10 PVWA Installation
11 PSM Installation
12 Active Directory Integration with Cyber-Ark
13 User and Group Creation
14 Safe Management
15 Policy Creation
16 Privileged Account Integration
17 Safe Membership
18 Privileged Account Connection
19 Workflow Creation
20 Overview of Cyber-Ark Reports
21 Overview of Cyber-Ark Session Monitoring
22 Backup and Restoration
23 Overview of PSMP
24 Overview of PSMP AD Bridging & OPM
25 Installation of PSMP
26 Installation & Configuration of PSMP AD bridging and OPM
27 Command restriction
28 SNMP Configuration
29 syslog configuration
30 Troubleshooting of Some Known Issues

You might also like