Privileged Access Management (PAM) Training Logo

Privileged Access Management (PAM) Training

Live Online & Classroom Enterprise Training

Privileged Access Management (PAM) focuses on controlling and securing access to critical systems and sensitive data. It helps manage privileged accounts, enforce security policies, and prevent unauthorized access.

Looking for a private batch ?

REQUEST A CALLBACK

Need help finding the right training?

Your Message

  • Enterprise Reporting

  • Lifetime Access

  • CloudLabs

  • 24x7 Support

  • Real-time code analysis and feedback

What is Privileged Access Management (PAM) Training about?

Privileged Access Management (PAM) is a critical security practice that helps organizations control, monitor, and secure privileged accounts and credentials across their IT environment. This training covers PAM concepts, best practices, implementation approaches, and tools. Participants will learn how to safeguard critical assets by enforcing least privilege, monitoring privileged activity, and reducing risks associated with credential theft and misuse.

What are the objectives of Privileged Access Management (PAM) Training ?

  • Learn how to identify and manage privileged accounts effectively. 
  • Explore PAM tools and solutions for securing credentials. 
  • Implement least privilege and just-in-time access strategies. 
  • Gain skills to monitor, audit, and report privileged activities. 

Who is Privileged Access Management (PAM) Training for?

  • IT Security Professionals 
  • System and Network Administrators 
  • Compliance and Risk Managers 
  • Identity & Access Management (IAM) Specialists 
  • Cybersecurity Consultants 

What are the prerequisites for Privileged Access Management (PAM) Training?

Prerequisites:    

  • Basic understanding of IT infrastructure (servers, networks, endpoints). 
  • Familiarity with cybersecurity principles. 
  • Knowledge of user identity and access management concepts. 
  • Awareness of compliance frameworks (GDPR, HIPAA, SOX, etc.). 
  • Prior experience with enterprise IT systems (recommended). 


Learning Path:   

  • Start with Identity and Access Management (IAM) fundamentals. 
  • Learn PAM concepts such as least privilege, password vaulting, and session management. 
  • Gain hands-on experience with PAM tools like CyberArk, BeyondTrust, or Delinea. 
  • Advance to governance, compliance, and auditing aspects of PAM. 
  • Specialize in cloud PAM solutions for hybrid and multi-cloud environments. 


Related Courses:   

  • Identity and Access Management (IAM) 
  • Zero Trust Security 
  • Cloud Security Fundamentals 
  • Endpoint Security and Management

Available Training Modes

Live Online Training

4 Days

Course Outline Expand All

Expand All

  • Introduction
  • PAM Course Content
  • Privileged Accounts
  • Privileged Credential Management
  • Using a Password Manager - Installation
  • Using a Password Manager - Multi-Factor Authentication
  • Using a Password Manager - Storing Passwords
  • Using a Password Manager - Adding Other Items
  • Using a Password Manager - Sharing and Security Settings
  • Privileged Session Management and Monitoring
  • Privileged Access Management Solutions
  • PAM - Building a test lab on Microsoft Azure - Design
  • PAM - Building a test lab on Microsoft Azure - Virtual Network
  • PAM - Building a test lab on Microsoft Azure - Installing virtual machines
  • PAM - Building a test lab on Microsoft Azure - Connecting to the lab VMs
  • PAM - Building a test lab on Microsoft Azure - Installing Domain Controller
  • PAM - Building a test lab on Microsoft Azure - Domain membership
  • Hardware requirements and upgrade for PAM
  • Server Installation
  • Installation - Certificate Installation
  • Initial Configuration and AD account onboarding
  • Linux Unix onboarding
  • Web Passwords onboarding
  • Secret Templates
  • Secret Template Lists
  • Secret Policies
  • Remote Password Changing
  • Session Recording
  • Linux SSH Key onboarding and connectivity
  • Linux SSH Key rotation
  • Linux SSH Proxy and Sudo Access
  • Users, Groups and Roles
  • Roles and Teams
  • Approval Workflows for credential access
  • Advanced Approval Workflows
  • Discovery and Credential Onboarding
  • AWS Discovery and Credential Onboarding
  • Discovery and onboarding rules
  • SSH Command Filtering
  • SAML, Ticketing and HSM
  • Reporting and hardening
  • Application Whitelisting Definition
  • Microsoft Windows Software Restriction Policy
  • Microsoft Windows Applocker Policy
  • Microsoft Windows Defender Application Control – WDAC
  • Download Thycotic Secret Server from Delinea Website
  • Server Preparation
  • Secret Server Installation
  • Privilege Manager Installation
  • Connecting to Secret Server and Privilege Manager
  • Delinea Privilege Manager Introduction
  • Privilege Manager Agent Installation
  • Blocking an Application using Privilege Manager
  • Allowing Visual Studio Installation without Admin Rights
  • Some More Useful Workstation Policies
  • Allowing Elevated Access to Run an Application without full Admin Rights
  • Client System Configurations on Delinea Privilege Manager
  • Managing Local Users and Groups on Delinea Privilege Manager
  • Reporting and Admin functions on Delinea Platform
  • Clustering and High Availability
  • Clustering and Disaster Recovery
  • Using a valid and trusted certificate
  • Distributed Engine and Sites
  • Distributed Engine
  • Load balancing with DNS round-robin
  • Creating a Unix Secret
  • Enabling RDP on a Linux Server
  • SSH Linux with Key Rotation
  • Connecting to a Linux Server using RDP
  • Using Custom Launchers - WinSCP
  • Using Custom Launchers - SecureCRT
  • Linux/Unix Discovery
  • VMWare ESX/ESXi Discovery
  • Workflow Approval
  • Workflow Approval Layers and Timeout
  • Onboarding the discovered accounts
  • Secret Search Filter
  • AD Integration Setup
  • AD Integration Usage
  • Multi Factor Authentication
  • Password Changing
  • Secret Dependancies
  • AD Accounts Discovery
  • Connection Manager
  • Mobile Application
  • Quantum Lock
  • Quantum Lock Password Reset
  • Syslog or SIEM integration
  • Event Pipeline and Policy
  • Unlimited Admin - Break The Glass
  • Backups
  • Restore Process
  • Effective Use of Session Recording
  • Privileged Behavior Analytics
  • Reporting
  • Delinea Session Connector
  • SSH and RDP Proxy

Who is the instructor for this training?

The trainer for this Privileged Access Management (PAM) Training has extensive experience in this domain, including years of experience training & mentoring professionals.

Reviews