IAM & PAM Security Specialist

In this course, you will learn about different components of Identity and Access Management, security considerations and some labs and examples. Identity and Access Management is a fundamental and critical cybersecurity capability, to ensure the right people and things have the right access to the right resources at the right time.
Privileged accounts are those with special permissions on a system, application, database or any other asset that can be used to perform any administration activity (E.g. changing the configuration), or have full access to the data. Failing to manage and monitor the usage of the privilege accounts in a corporate environment or an organization could have serious consequences.
Once hackers or malicious actors find a way to get into a system or a network, they will be looking to compromise a privilege account to get access to those systems and information that they are not authorized. Privilege Account Management is an important topic in Cyber Security and a requirements for a lot of regulatory and compliance frameworks.

img
request

Can’t find a batch you were looking for?

 

In this course, you will learn about different components of Identity and Access Management, security considerations and some labs and examples. Identity and Access Management is a fundamental and critical cybersecurity capability, to ensure the right people and things have the right access to the right resources at the right time.

Privileged accounts are those with special permissions on a system, application, database or any other asset that can be used to perform any administration activity (E.g. changing the configuration), or have full access to the data. Failing to manage and monitor the usage of the privilege accounts in a corporate environment or an organization could have serious consequences.

Once hackers or malicious actors find a way to get into a system or a network, they will be looking to compromise a privilege account to get access to those systems and information that they are not authorized. Privilege Account Management is an important topic in Cyber Security and a requirements for a lot of regulatory and compliance frameworks.

 

Objectives:
 

In this course you will learn about :

 
  • Privileged accounts and credentials management, what they are, why they are important and different types
  • Privilege credentials security considerations
  • Implement and Usage of password manager solutions
  • Privilege Account Management (PAM) or Privilege Account and Session Management (PASM) solutions
  • Building a lab environment for testing PAM solutions
  • Implement and Configure a PAM solution
  • Onboard systems and credentials on the PAM solution (Windows, Linux, Web)
  • Utilise important PAM capabilities like remote access, sessions recording, audit, automated password changing, etc.
  • Review privilege credential usage, reporting and auditing requirements
  • Best practices to implement PAM solutions
  • Identity and Access Management (IAM)
  • Privileged Account Management (PAM)
  • Identity Governance and Administration (IGA)
 

Course content

 

Identity and Access Management (IAM)

 

Identification, Authentication, Authorization & Accounting
  • Introduction and Summary
  • CIA Principles
  • IAAA operation
  • Some Important Security Concepts
  • Kerberos
  • Identity federation & SSO
  • Web Services Federation and OAuth
  • Authentication Factors
  • Biometrics
  • Okta Platform Introduction
  • Okta developer free account
  • Okta Getting Started – Customized Goals
  • Okta User and Group Management and Directory Integration
  • Okta Customizations
  • Okta Application Integration 1
  • Okta Application Integration 2
  • Okta Custom Application Integration
  • Okta Self Service Portal
  • Okta Security Settings
  • Okta System Logs and Reporting
Privileged Account Management
  • Introduction to Privileged Access Management
  • Privileged Accounts
  • Privileged Account and Session Management
  • Privileged Account Monitoring
  • Application Whitelisting
  • Privileged Account (Access) Management (PAM)
Identity Governance and Administration
  • Identity Governance and Administration (IGA)
  • User Onboarding
  • User Termination & Role changes
  • Access Controls & RBAC
  • Access validation & Certification
  • Segregation of Duties, Auditing and Reporting
  • System for Cross-domain Identity Management
  • Identity Governance and Administration – Definition
  • One Identity Manager Virtual Lab Design
  • One Identity Manager Virtual Lab Environment
  • One Identity Manager Virtual Lab – Web Login
  • One Identity Manager Virtual Lab – Manager Access
  • One Identity Manager Virtual Lab – Self Service Portal
  • One Identity Manager Virtual Lab – Service Catalog
  • One Identity Manager Virtual Lab – Additional roles
  • One Identity Manager Virtual Lab – Business and System Roles
  • One Identity Manager Virtual Lab – Role Owners Web Access
  • One Identity Manager Virtual Lab – Attestation Policies
  • Compliance and Governance Administration
Data Governance and Protection
  • Introduction to Data Governance and Protection
  • Data Types
  • Intellectual property
  • Data Classification
  • Industry and local laws and regulations
  • Data Type Management & Monitoring
  • Security Policy Framework
  • Data Breach and Incident Response Process
  • Notifiable Data Breaches
  • Data Security strategy for organizations

 

Privileged Access Management (PAM)

 

Privileged Credential Management
  • Introduction Privileged Credential Management
  • Using a Password Manager – Installation
  • Using a Password Manager – Multi-Factor Authentication
  • Using a Password Manager – Storing Passwords
  • Using a Password Manager – Adding Other Items
  • Using a Password Manager – Sharing and Security Settings
Privileged Access Management
  • Privileged Session Management and Monitoring
  • Privileged Access Management Solutions
  • PAM – Building a test lab on Microsoft Azure – Virtual Network
  • PAM – Building a test lab on Microsoft Azure – Installing virtual machines
  • PAM – Building a test lab on Microsoft Azure – Connecting to the lab VMs
  • PAM – Building a test lab on Microsoft Azure – Installing Domain Controller
  • PAM – Building a test lab on Microsoft Azure – Domain membership
Thycotic Secret Server Installation and Configuration
  • Hardware requirements and upgrade for PAM
  • Thycotic Secret Server Installation
  • Thycotic Secret Server Installation – Certificate Installation
  • Thycotic Secret Server Initial Configuration and AD account onboarding
  • Thycotic Secret Server – Web Passwords onboarding
  • Thycotic Secret Server – Secret Templates
  • Thycotic Secret Server – Secret Template Lists
  • Thycotic Secret Server – Secret Policies
  • Thycotic Secret Server – Remote Password Changing
  • Thycotic Secret Server – Session Recording
  • Thycotic Secret Server – Linux SSH Key onboarding and connectivity
  • Thycotic Secret Server – Linux SSH Key rotation
  • Thycotic Secret Server – Linux SSH Proxy and Sudo Access
  • Thycotic Secret Server – Users, Groups and Roles
  • Thycotic Secret Server – Roles and Teams
  • Thycotic Secret Server – Approval Workflows for credential access
  • Thycotic Secret Server – Advanced Approval Workflows
  • Thycotic Secret Server – Discovery and Credential Onboarding
  • Thycotic Secret Server – AWS Discovery and Credential Onboarding
  • Thycotic Secret Server – Discovery and onboarding rules
  • Thycotic Secret Server – SSH Command Filtering
  • Thycotic Secret Server – SAML, Ticketing and HSM
  • Thycotic Secret Server – Reporting and hardening
Application White Listing
  • Application Whitelisting Definition
  • Microsoft Windows Software Restriction Policy
  • Microsoft Windows Applocker Policy
  • Microsoft Windows Defender Application Control – WDAC

 

To see the full course content Download now

Course Prerequisites

 
  • Basic IT skills
  • Basic IT and Cyber Security knowledge (Not essential)
  • Basic Microsoft Windows knowledge

Who can attend

 
  • Security Administrators
  • Security Professionals
  • Infrastructure Administrators
  • Security Architects
  • IT Architects
  • Security Operators
  • Cyber Security Students
  • Information Security Team members
  • Information Security Professional
  • Chief Information Security Manager

Number of Hours: 30hrs

Certification

AWS Certified Security - Specialty

Key features

  • One to One Training
  • Online Training
  • Fastrack & Normal Track
  • Resume Modification
  • Mock Interviews
  • Video Tutorials
  • Materials
  • Real Time Projects
  • Virtual Live Experience
  • Preparing for Certification

FAQs

DASVM Technologies offers 300+ IT training courses with 10+ years of Experienced Expert level Trainers.

  • One to One Training
  • Online Training
  • Fastrack & Normal Track
  • Resume Modification
  • Mock Interviews
  • Video Tutorials
  • Materials
  • Real Time Projects
  • Materials
  • Preparing for Certification

Call now: +91-99003 49889 and know the exciting offers available for you!

We working and coordinating with the companies exclusively to get placed. We have a placement cell focussing on training and placements in Bangalore. Our placement cell help more than 600+ students per year.

Learn from experts active in their field, not out-of-touch trainers. Leading practitioners who bring current best practices and case studies to sessions that fit into your work schedule. We have a pool of experts and trainers are composed with highly skilled and experienced in supporting you in specific tasks and provide professional support. 24x7 Learning support from mentors and a community of like-minded peers to resolve any conceptual doubts. Our trainers has contributed in the growth of our clients as well as professionals.

All of our highly qualified trainers are industry experts with at least 10-12 years of relevant teaching experience. Each of them has gone through a rigorous selection process which includes profile screening, technical evaluation, and a training demo before they are certified to train for us. We also ensure that only those trainers with a high alumni rating continue to train for us.

No worries. DASVM technologies assure that no one misses single lectures topics. We will reschedule the classes as per your convenience within the stipulated course duration with all such possibilities. If required you can even attend that topic with any other batches.

DASVM Technologies provides many suitable modes of training to the students like:

  • Classroom training
  • One to One training
  • Fast track training
  • Live Instructor LED Online training
  • Customized training

Yes, the access to the course material will be available for lifetime once you have enrolled into the course.

You will receive DASVM Technologies recognized course completion certification & we will help you to crack global certification with our training.

Yes, DASVM Technologies provides corporate trainings with Course Customization, Learning Analytics, Cloud Labs, Certifications, Real time Projects with 24x7 Support.

Yes, DASVM Technologies provides group discounts for its training programs. Depending on the group size, we offer discounts as per the terms and conditions.

We accept all major kinds of payment options. Cash, Card (Master, Visa, and Maestro, etc), Wallets, Net Banking, Cheques and etc.

DASVM Technologies has a no refund policy. Fees once paid will not be refunded. If the candidate is not able to attend a training batch, he/she is to reschedule for a future batch. Due Date for Balance should be cleared as per date given. If in case trainer got cancelled or unavailable to provide training DASVM will arrange training sessions with other backup trainer.

Your access to the Support Team is for lifetime and will be available 24/7. The team will help you in resolving queries, during and after the course.

Please Contact our course advisor +91-99003 49889. Or you can share your queries through info@dasvmtechnologies.com

like our courses