Module 1: Introduction to PAM-IAM & CyberArk
🔶Overview of cybersecurity access challenges
🔶What is Identity & Access Management (IAM)
🔶What is Privileged Access Management (PAM)
🔶Difference between IAM and PAM
🔶Types of privileged accounts
🔶Risks of unmanaged privileged access
🔶Why PAM is mandatory in enterprises
🔶Introduction to CyberArk
🔶CyberArk market position and use cases
🔶High-level CyberArk architecture overview
Module 2: Vault Theory – Part 1
🔶What is CyberArk Digital Vault
🔶Vault purpose and core responsibilities
🔶Vault architecture overview
🔶Vault internal components
🔶Vault security principles
🔶Vault communication model
🔶Password encryption concepts
🔶Vault users vs CyberArk users
Module 3: Vault Theory – Part 2
🔶Vault access control mechanisms
🔶Vault authorization flow
🔶Vault file structure
🔶Vault services explanation
🔶Vault hardening best practices
🔶Vault ports and firewall rules
🔶Vault logs and auditing
🔶Vault performance considerations
Module 4: Password Vault Web Access (PVWA)
🔶What is Password Vault Web Access (PVWA)
🔶PVWA role in CyberArk architecture
🔶PVWA authentication methods
🔶PVWA authorization model
🔶User & group management via PVWA
🔶Safe access via PVWA
🔶PVWA security best practices
🔶Common PVWA issues overview
Module 5: CPM Theory
🔶What is Central Policy Manager (CPM)
🔶CPM role in password lifecycle
🔶Password verification process
🔶Password change process
🔶CPM platform dependency
🔶CPM communication flow
🔶CPM logs and troubleshooting basics
🔶CPM security best practices
Module 6: Privileged Session Manager (PSM) Theory
🔶What is Privileged Session Manager (PSM)
🔶PSM architecture and components
🔶Session isolation concept
🔶Session recording and monitoring
🔶PSM for Windows (RDP)
🔶PSM for Unix (SSH)
🔶PSM security benefits
🔶PSM auditing use cases
Module 7: Q&A – Theory Discussion
🔶Review of Vault, PVWA, CPM, PSM
🔶Architecture-based questions
🔶Real-time scenario discussions
🔶Interview-oriented Q&A
🔶Troubleshooting approach discussion
🔶Enterprise design best practices
Module 8: PSMP & PTA Theory
🔶What is PSMP (Privileged Session Manager for SSH)
🔶PSMP architecture
🔶PSMP use cases
🔶Difference between PSM and PSMP
🔶What is PTA (Privileged Threat Analytics)
🔶Insider threat detection
🔶Risk scoring and alerts
🔶UEBA concepts in CyberArk
Module 9: Active Directory (DC) Installation
🔶Active Directory fundamentals
🔶Domain Controller concepts
🔶AD installation steps
🔶DNS configuration basics
🔶Users and groups creation
🔶AD security best practices
🔶AD relevance in CyberArk
Module 10: Vault Installation
🔶Pre-installation prerequisites
🔶Vault server sizing
🔶Vault installation steps
🔶Initial configuration
🔶Vault post-installation checks
🔶Vault connectivity validation
🔶Vault hardening steps
Module 11: PVWA Installation
🔶PVWA prerequisites
🔶IIS configuration
🔶PVWA installation steps
🔶PVWA post-installation checks
🔶Browser & certificate configuration
🔶PVWA troubleshooting basics
Module 12: CPM Installation
🔶CPM server prerequisites
🔶CPM installation steps
🔶CPM service validation
🔶CPM-Vault connectivity
🔶Platform assignment validation
🔶CPM troubleshooting basics
Module 13: PSM Installation
🔶PSM server prerequisites
🔶PSM installation steps
🔶Session recording validation
🔶PSM connector overview
🔶PSM user access testing
🔶PSM hardening basics
Module 14: DR Vault Installation
🔶What is Disaster Recovery (DR) Vault
🔶DR architecture
🔶DR Vault installation steps
🔶Vault replication concepts
🔶DR communication flow
🔶DR security considerations
Module 15: DR Drill
🔶Purpose of DR drill
🔶DR failover process
🔶DR switchover steps
🔶DR validation checks
🔶DR rollback process
🔶Enterprise DR best practices
Module 16: LDAP Integration
🔶LDAP concepts
🔶LDAP vs Active Directory
🔶CyberArk LDAP integration steps
🔶User & group mapping
🔶Authentication testing
🔶Common LDAP issues
Module 17: SMTP Integration
🔶SMTP basics
🔶SMTP role in CyberArk
🔶Email notification use cases
🔶SMTP configuration steps
🔶Alert & report email setup
🔶SMTP troubleshooting
Module 18: CyberArk Operations & Manual Onboarding
🔶System health monitoring
🔶Vault health checks
🔶Safe management
🔶Platform management
🔶Manual account onboarding
🔶Account verification process
🔶Operational best practices
Module 19: Password Upload Utility (PUU)
🔶What is PUU
🔶PUU architecture
🔶Bulk onboarding concepts
🔶PUU file format
🔶PUU execution steps
🔶PUU error handling
Module 20: Bulk Onboarding via PVWA
🔶Bulk onboarding through UI
🔶Platform selection
🔶Safe mapping
🔶Password verification
🔶Bulk onboarding limitations
🔶Best practices
Module 21: Master Policy
🔶What is Master Policy
🔶Password rules
🔶Complexity settings
🔶Platform inheritance
🔶Policy enforcement
🔶Security implications
Module 22: AAM / AIM – Credential Provider
🔶What is Application Access Manager (AAM)
🔶Central Credential Provider (CCP)
🔶Secrets management concepts
🔶Password retrieval methods
🔶API-based access
🔶Application integration use cases
Module 23: CyberArk Password Management
🔶Password lifecycle management
🔶Rotation schedules
🔶Verification failures
🔶Reconciliation process
🔶Compliance enforcement
🔶Security best practices
Module 24: CyberArk Session Management
🔶Session control policies
🔶Live session monitoring
🔶Session termination
🔶Session recording review
🔶Compliance & audit usage
🔶Forensic investigation use cases
Module 25: RCA & Secure Connect
🔶What is RCA (Request & Connect Access)
🔶Adhoc connection use cases
🔶Secure Connect concept
🔶CyberArk port overview
🔶Network design discussion
🔶Enterprise architecture scenarios
Module 26: Reports
🔶Native CyberArk reports
🔶Compliance reports
🔶Access reports
🔶Session reports
🔶Audit requirements
🔶Report scheduling
Module 27: Export Vault Data
🔶Vault data export purpose
🔶Export tools overview
🔶Data security considerations
🔶Compliance use cases
🔶Audit support scenarios
Module 28: Account Discovery
🔶Account discovery concept
🔶Discovery methods
🔶Discovery scan configuration
🔶Risk identification
🔶Post-discovery onboarding
🔶Enterprise discovery strategy
Module 29: Backup & Restore
🔶Backup importance
🔶Vault backup process
🔶Restore scenarios
🔶Backup validation
🔶Security considerations
🔶Best practices
Module 30: NTP, RADIUS & SIEM Integration
🔶NTP importance in CyberArk
🔶Time synchronization
🔶RADIUS authentication
🔶MFA integration concepts
🔶SIEM integration overview
🔶Log forwarding use cases
Module 31: CyberArk Version Upgrade
🔶Upgrade planning strategy
🔶Pre-upgrade checks
🔶Upgrade steps
🔶Post-upgrade validation
🔶Rollback planning
🔶Upgrade best practices
Module 32: Interview Preparation
🔶Proctored Assessment
🔶Resume Preparation
🔶Mock Test