-25%
PAM

CyberArk-PAM Instructor-led Training

Last Update January 7, 2026
0 already enrolled

About This Course

The CyberArk-PAM Instructor-led Training is a comprehensive, hands-on program designed to help cybersecurity and IAM professionals master Privileged Access Management (PAM) using CyberArk at their own pace. This course covers end-to-end CyberArk architecture, configuration, administration, and real-world use cases, enabling learners to confidently manage and secure privileged identities in enterprise environments.

Through structured video lessons, practical demonstrations, and scenario-based explanations, learners will gain deep expertise in CyberArk Vault, PSM, CPM, onboarding applications, account management, and access controls. The course is ideal for professionals preparing for CyberArk PAM roles, interviews, and certifications, while also building strong real-time project knowledge.

Curriculum

50h

Module 1: Introduction to PAM-IAM & CyberArk

🔶Overview of cybersecurity access challenges 🔶What is Identity & Access Management (IAM) 🔶What is Privileged Access Management (PAM) 🔶Difference between IAM and PAM 🔶Types of privileged accounts 🔶Risks of unmanaged privileged access 🔶Why PAM is mandatory in enterprises 🔶Introduction to CyberArk 🔶CyberArk market position and use cases 🔶High-level CyberArk architecture overview

Module 2: Vault Theory – Part 1

🔶What is CyberArk Digital Vault 🔶Vault purpose and core responsibilities 🔶Vault architecture overview 🔶Vault internal components 🔶Vault security principles 🔶Vault communication model 🔶Password encryption concepts 🔶Vault users vs CyberArk users

Module 3: Vault Theory – Part 2

🔶Vault access control mechanisms 🔶Vault authorization flow 🔶Vault file structure 🔶Vault services explanation 🔶Vault hardening best practices 🔶Vault ports and firewall rules 🔶Vault logs and auditing 🔶Vault performance considerations

Module 4: Password Vault Web Access (PVWA)

🔶What is Password Vault Web Access (PVWA) 🔶PVWA role in CyberArk architecture 🔶PVWA authentication methods 🔶PVWA authorization model 🔶User & group management via PVWA 🔶Safe access via PVWA 🔶PVWA security best practices 🔶Common PVWA issues overview

Module 5: CPM Theory

🔶What is Central Policy Manager (CPM) 🔶CPM role in password lifecycle 🔶Password verification process 🔶Password change process 🔶CPM platform dependency 🔶CPM communication flow 🔶CPM logs and troubleshooting basics 🔶CPM security best practices

Module 6: Privileged Session Manager (PSM) Theory

🔶What is Privileged Session Manager (PSM) 🔶PSM architecture and components 🔶Session isolation concept 🔶Session recording and monitoring 🔶PSM for Windows (RDP) 🔶PSM for Unix (SSH) 🔶PSM security benefits 🔶PSM auditing use cases

Module 7: Q&A – Theory Discussion

🔶Review of Vault, PVWA, CPM, PSM 🔶Architecture-based questions 🔶Real-time scenario discussions 🔶Interview-oriented Q&A 🔶Troubleshooting approach discussion 🔶Enterprise design best practices

Module 8: PSMP & PTA Theory

🔶What is PSMP (Privileged Session Manager for SSH) 🔶PSMP architecture 🔶PSMP use cases 🔶Difference between PSM and PSMP 🔶What is PTA (Privileged Threat Analytics) 🔶Insider threat detection 🔶Risk scoring and alerts 🔶UEBA concepts in CyberArk

Module 9: Active Directory (DC) Installation

🔶Active Directory fundamentals 🔶Domain Controller concepts 🔶AD installation steps 🔶DNS configuration basics 🔶Users and groups creation 🔶AD security best practices 🔶AD relevance in CyberArk

Module 10: Vault Installation

🔶Pre-installation prerequisites 🔶Vault server sizing 🔶Vault installation steps 🔶Initial configuration 🔶Vault post-installation checks 🔶Vault connectivity validation 🔶Vault hardening steps

Module 11: PVWA Installation

🔶PVWA prerequisites 🔶IIS configuration 🔶PVWA installation steps 🔶PVWA post-installation checks 🔶Browser & certificate configuration 🔶PVWA troubleshooting basics

Module 12: CPM Installation

🔶CPM server prerequisites 🔶CPM installation steps 🔶CPM service validation 🔶CPM-Vault connectivity 🔶Platform assignment validation 🔶CPM troubleshooting basics

Module 13: PSM Installation

🔶PSM server prerequisites 🔶PSM installation steps 🔶Session recording validation 🔶PSM connector overview 🔶PSM user access testing 🔶PSM hardening basics

Module 14: DR Vault Installation

🔶What is Disaster Recovery (DR) Vault 🔶DR architecture 🔶DR Vault installation steps 🔶Vault replication concepts 🔶DR communication flow 🔶DR security considerations

Module 15: DR Drill

🔶Purpose of DR drill 🔶DR failover process 🔶DR switchover steps 🔶DR validation checks 🔶DR rollback process 🔶Enterprise DR best practices

Module 16: LDAP Integration

🔶LDAP concepts 🔶LDAP vs Active Directory 🔶CyberArk LDAP integration steps 🔶User & group mapping 🔶Authentication testing 🔶Common LDAP issues

Module 17: SMTP Integration

🔶SMTP basics 🔶SMTP role in CyberArk 🔶Email notification use cases 🔶SMTP configuration steps 🔶Alert & report email setup 🔶SMTP troubleshooting

Module 18: CyberArk Operations & Manual Onboarding

🔶System health monitoring 🔶Vault health checks 🔶Safe management 🔶Platform management 🔶Manual account onboarding 🔶Account verification process 🔶Operational best practices

Module 19: Password Upload Utility (PUU)

🔶What is PUU 🔶PUU architecture 🔶Bulk onboarding concepts 🔶PUU file format 🔶PUU execution steps 🔶PUU error handling

Module 20: Bulk Onboarding via PVWA

🔶Bulk onboarding through UI 🔶Platform selection 🔶Safe mapping 🔶Password verification 🔶Bulk onboarding limitations 🔶Best practices

Module 21: Master Policy

🔶What is Master Policy 🔶Password rules 🔶Complexity settings 🔶Platform inheritance 🔶Policy enforcement 🔶Security implications

Module 22: AAM / AIM – Credential Provider

🔶What is Application Access Manager (AAM) 🔶Central Credential Provider (CCP) 🔶Secrets management concepts 🔶Password retrieval methods 🔶API-based access 🔶Application integration use cases

Module 23: CyberArk Password Management

🔶Password lifecycle management 🔶Rotation schedules 🔶Verification failures 🔶Reconciliation process 🔶Compliance enforcement 🔶Security best practices

Module 24: CyberArk Session Management

🔶Session control policies 🔶Live session monitoring 🔶Session termination 🔶Session recording review 🔶Compliance & audit usage 🔶Forensic investigation use cases

Module 25: RCA & Secure Connect

🔶What is RCA (Request & Connect Access) 🔶Adhoc connection use cases 🔶Secure Connect concept 🔶CyberArk port overview 🔶Network design discussion 🔶Enterprise architecture scenarios

Module 26: Reports

🔶Native CyberArk reports 🔶Compliance reports 🔶Access reports 🔶Session reports 🔶Audit requirements 🔶Report scheduling

Module 27: Export Vault Data

🔶Vault data export purpose 🔶Export tools overview 🔶Data security considerations 🔶Compliance use cases 🔶Audit support scenarios

Module 28: Account Discovery

🔶Account discovery concept 🔶Discovery methods 🔶Discovery scan configuration 🔶Risk identification 🔶Post-discovery onboarding 🔶Enterprise discovery strategy

Module 29: Backup & Restore

🔶Backup importance 🔶Vault backup process 🔶Restore scenarios 🔶Backup validation 🔶Security considerations 🔶Best practices

Module 30: NTP, RADIUS & SIEM Integration

🔶NTP importance in CyberArk 🔶Time synchronization 🔶RADIUS authentication 🔶MFA integration concepts 🔶SIEM integration overview 🔶Log forwarding use cases

Module 31: CyberArk Version Upgrade

🔶Upgrade planning strategy 🔶Pre-upgrade checks 🔶Upgrade steps 🔶Post-upgrade validation 🔶Rollback planning 🔶Upgrade best practices

Module 32: Interview Preparation

🔶Proctored Assessment 🔶Resume Preparation 🔶Mock Test

Earn a certificate

Add this certificate to your resume to demonstrate your skills & increase your chances of getting noticed.

selected template

Your Instructors

Admin

0/5
19 Courses
0 Reviews
10 Students
See more
ChatGPT Image Jan 6, 2026, 07_06_46 PM

29,999.0039,999.00

25% off
Level
All Levels
Duration 50 hours
Subject
PAM
Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
  • Image
  • SKU
  • Rating
  • Price
  • Stock
  • Availability
  • Add to cart
  • Description
  • Content
  • Weight
  • Dimensions
  • Additional information
Click outside to hide the comparison bar
Compare

Don't have an account yet? Sign up for free

No apps configured. Please contact your administrator.
No apps configured. Please contact your administrator.
Alert: You are not allowed to copy content or view source !!