Introduction to CyberArk Training Logo

Introduction to CyberArk Training

Live Online & Classroom Enterprise Training

Introduces CyberArk’s privileged access management solutions. Covers credential vaulting, session recording, and privileged account security.

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Introduction to CyberArk Training about?

The Introduction to CyberArk course provides a foundational understanding of CyberArk’s Privileged Access Security (PAS) solution. It covers the core components of the CyberArk architecture, vault concepts, credential management, and session monitoring. Participants will explore how CyberArk enhances enterprise security by preventing unauthorized privileged access and protecting critical assets from insider and external threats. This course prepares learners for hands-on administration and further advanced CyberArk training.

What are the objectives of Introduction to CyberArk Training ?

  • Understand the fundamentals and architecture of the CyberArk PAS solution. 
  • Learn how privileged accounts and credentials are secured in CyberArk. 
  • Explore CyberArk Vault, Password Vault Web Access (PVWA), and Central Policy Manager. 
  • Understand session management and monitoring through the Privileged Session Manager. 
  • Gain foundational knowledge for CyberArk implementation and administration.

Who is Introduction to CyberArk Training for?

  • IT Security Administrators and Analysts. 
  • Identity and Access Management (IAM) Professionals. 
  • System and Network Administrators. 
  • Security Operations Center (SOC) Analysts. 
  • Anyone beginning a career in Privileged Access Management.

What are the prerequisites for Introduction to CyberArk Training?

Prerequisites:  
  • Basic understanding of cybersecurity concepts. 
  • Familiarity with Windows and Linux operating systems. 
  • General knowledge of network and system administration. 
  • Awareness of identity and access management principles.  
  • Interest in security operations or infrastructure protection. 

Learning Path: 
  • Introduction to Privileged Access Management (PAM) 
  • CyberArk Architecture and Core Components 
  • CyberArk Vault and Policy Management 
  • Session Monitoring and Access Control 
  • Administration Basics and Next Steps Toward Certification 

Related Courses: 
  • CyberArk Privileged Access Security Administration (Level 1) 
  • CyberArk Advanced Administration (Level 2) 
  • Identity and Access Management Fundamentals 
  • PAM Best Practices and Governance 

Available Training Modes

Live Online Training

4 Days

Course Outline Expand All

Expand All

  • What are CyberArk, IDM, and IAM?
  • Google trend reports on CyberArk, Sailpoint, and Okta.
  • What is the scope of this CyberArk course?
  • Where does CyberArk stand (compared to other competitors)?
  • Google trend report on Competitors and comparison
  • Naukri and Monster job openings
  • Salary report from Indeed & Payscale
  • A walkthrough of the course content.
  • Short CyberArk Demo with a Real-Time Project
  • Navigation
  • Important options and Shortcuts in the tool
  • Types of Tools in CyberArk (Walkthrough)
  • What’s the architecture—SOA, Client server or cloud?
  • CyberArk Cloud?
  • Supported Systems (Is Windows, Linux, Mac supported?)
  • What is the Alternative if it’s not supported? (Virtualbox)
  • Supported Databases
  • Integration with other tools.
  • Limitations
  • CyberArk Vault
  • Password Vault Web Access Manager
  • Privileged Session Manager
  • Central Password Manager
  • CyberArk Vault Client.
  • Installation Pre-requisites (Network, Software OS, and Hardware)
  • CyberArk Port Awareness.
  • CyberArk Vault Installation.
  • CyberArk Active Directory Integration.
  • The CyberArk Email Notification Engine configures awareness.
  • Cyberark CPM Installation.
  • Cyberark PVWA Installation.
  • Cyberark PSM Installation.
  • Cyberark Vault Client Installation.
  • Master Policy
  • CPM Platform Policy
  • Scheduled Task
  • Services
  • Safe Creation
  • User addition (Ldap)
  • User Access Matrix
  • Dual Control
  • Object-Level Access Control
  • Windows
  • Unix/Linux
  • Network Device Overview
  • Security Device Overview.
  • User OnBoarding
  • Privileged Single-Sign-on
  • Password Reconciliation
  • Access privileges of User Accounts in PAM
  • Authentication (2-factor) Overview
  • Dual Access Control
  • Auditing/Reporting
  • Session Recording
  • Users OffBoarding
  • Creating an encrypted credential password file for PvwaApp user
  • Creating an encrypted credential password file for gw user
  • Creating an encrypted credential password file for a password manager user
  • Creating an encrypted credential password file for psmapp user creating an encrypted credential password file for psmgw user
  • Unlocking and password resetting of all the above-mentioned system users

Who is the instructor for this training?

The trainer for this Introduction to CyberArk Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews