Introduction to CyberArk Training Logo

Introduction to CyberArk Training

Live Online & Classroom Enterprise Training

Introduces CyberArk’s privileged access management solutions. Covers credential vaulting, session recording, and privileged account security.

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Introduction to CyberArk Training about?

This course provides a comprehensive introduction to CyberArk’s Privileged Access Management (PAM) and Identity Security solutions. It is designed to help participants understand the importance of securing privileged accounts and identities in modern IT environments. The course covers the challenges, strategies, and tools necessary to implement and manage CyberArk’s technologies effectively. 

What are the objectives of Introduction to CyberArk Training ?

  • Understand the core components and capabilities of CyberArk.
  • Learn to address identity and privilege management challenges.
  • Gain insights into best practices for Privileged Access Management (PAM).
  • Explore Identity Security concepts, Zero Trust principles, and CyberArk technologies.
  • Develop practical skills through hands-on demos and scenarios.

Who is Introduction to CyberArk Training for?

  • IT professionals interested in learning CyberArk solutions.
  • System administrators and security engineers managing privileged accounts.
  • DevOps teams aiming to secure identities and privileges.
  • Professionals preparing for CyberArk certifications.

What are the prerequisites for Introduction to CyberArk Training?

  • Basic understanding of IT security concepts and identity management.
  • Familiarity with IT infrastructure and networking is recommended. 

Available Training Modes

Live Online Training

5 Days

Self-Paced Training

20 Hours

Course Outline Expand All

Expand All

  • What are CyberArk, IDM, and IAM?
  • Google trend reports on CyberArk, Sailpoint, and Okta.
  • What is the scope of this CyberArk course?
  • Where does CyberArk stand (compared to other competitors)?
  • Google trend report on Competitors and comparison
  • Naukri and Monster job openings
  • Salary report from Indeed & Payscale
  • A walkthrough of the course content.
  • Short CyberArk Demo with a Real-Time Project
  • Navigation
  • Important options and Shortcuts in the tool
  • Types of Tools in CyberArk (Walkthrough)
  • What’s the architecture—SOA, Client server or cloud?
  • CyberArk Cloud?
  • Supported Systems (Is Windows, Linux, Mac supported?)
  • What is the Alternative if it’s not supported? (Virtualbox)
  • Supported Databases
  • Integration with other tools.
  • Limitations
  • CyberArk Vault
  • Password Vault Web Access Manager
  • Privileged Session Manager
  • Central Password Manager
  • CyberArk Vault Client.
  • Installation Pre-requisites (Network, Software OS, and Hardware)
  • CyberArk Port Awareness.
  • CyberArk Vault Installation.
  • CyberArk Active Directory Integration.
  • The CyberArk Email Notification Engine configures awareness.
  • Cyberark CPM Installation.
  • Cyberark PVWA Installation.
  • Cyberark PSM Installation.
  • Cyberark Vault Client Installation.
  • Master Policy
  • CPM Platform Policy
  • Scheduled Task
  • Services
  • Safe Creation
  • User addition (Ldap)
  • User Access Matrix
  • Dual Control
  • Object-Level Access Control
  • Windows
  • Unix/Linux
  • Network Device Overview
  • Security Device Overview.
  • User OnBoarding
  • Privileged Single-Sign-on
  • Password Reconciliation
  • Access privileges of User Accounts in PAM
  • Authentication (2-factor) Overview
  • Dual Access Control
  • Auditing/Reporting
  • Session Recording
  • Users OffBoarding
  • Creating an encrypted credential password file for PvwaApp user
  • Creating an encrypted credential password file for gw user
  • Creating an encrypted credential password file for a password manager user
  • Creating an encrypted credential password file for psmapp user creating an encrypted credential password file for psmgw user
  • Unlocking and password resetting of all the above-mentioned system users

Who is the instructor for this training?

The trainer for this Introduction to CyberArk Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews