0% found this document useful (0 votes)
175 views3 pages

Training+Curriculum CyberArk+Proficient

The document outlines a 4 day CyberArk Level 2 training curriculum. Day 1 covers privileged identity management concepts and the CyberArk solution components. Day 2 focuses on installing the CyberArk infrastructure including the vault, Active Directory integration, and other modules. Day 3 is about configuring CyberArk policies, creating safes and user access controls. Day 4 reviews use cases, auditing, troubleshooting, and disaster recovery procedures. The training concludes with an assessment test.

Uploaded by

khan asad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
175 views3 pages

Training+Curriculum CyberArk+Proficient

The document outlines a 4 day CyberArk Level 2 training curriculum. Day 1 covers privileged identity management concepts and the CyberArk solution components. Day 2 focuses on installing the CyberArk infrastructure including the vault, Active Directory integration, and other modules. Day 3 is about configuring CyberArk policies, creating safes and user access controls. Day 4 reviews use cases, auditing, troubleshooting, and disaster recovery procedures. The training concludes with an assessment test.

Uploaded by

khan asad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

CyberArk Level 2 Training Curriculum

CyberArk Training
Day one
Topics Covers
1.0 Privileged Identity Management - Introduction
a) Enterprise pain areas
b) Associated risk
c) Expected Solution

2.0 CyberArk Overview


3.0 CyberArk Solution Components
a) CyberArk Vault
b) Password Vault Web Access Manager
c) Privileged Session Manager
d) Central Password Manager
e) CyberArk Vault Client

4.0 Overview of CyberArk functioning


Day two
Topics Covers
1. CyberArk Infrastructure Installation
a) Installation Pre-requisites (Network, Software OS/Hardware)
b) CyberArk Port awareness.
c) CyberArk Vault Installation.
d) CyberArk Active Directory Integration.
e) CyberArk Email Notification engine configure awareness.
f) Cyberark CPM Installation.
g) Cyberark PVWA Installation.
h) Cyberark PSM Installation.
i) Cyberark Vault Client Installation.

2. CyberArk Policy Configuration Overview


Day three
Topics Covers
1. CyberArk Policy Creation
a) Master Policy
b) CPM Platform Policy
c) Scheduled Task
d) Services
2. CyberArk Safe Management
a) Safe Creation
b) User addition (Ldap)
c) User Access Matrix
d) Dual Control
e) Object Level Access Control

3.CyberArk Account Integration


a) Windows
b) Unix/Linux
c) Network Device Overview
d) Security Device Overview.

Day Four
1. CyberArk Use Cases
a) User OnBoarding
b) Privileged Single-Sign-on
c) Password Reconciliation
d) Access privilege of User Accounts in PAM
e) Authentication (2-factor) Overview
f) Dual Access Control
g) Auditing/Reporting
h) Session Recording
i) Users OffBoarding

2.0 CyberArk Vault Backup Activity


3.0 CyberArk Trouble Shooting
a) Creating encrypted credential password file for pvwaapp user
b) Creating encrypted credential password file for gw user
c) Creating encrypted credential password file for passwordmanager user
d) Creating encrypted credential password file for psmapp user
e) Creating encrypted credential password file for psmgw user
f) Unlocking and password reseting of all above mentioned system users
4.0 CyberArk DR Overview
a) DR Vault
b) DR CPM
c) DR PVWA
d) DR PSM

5. Assessment
a) Objective Type Test

You might also like