PAM Secure Implementation
Duration: 42m 40s | .MP4 1920x1080, 30 fps(r) | AAC, 48000 Hz, 2ch | 117 MB
Genre: eLearning | Language: English
Duration: 42m 40s | .MP4 1920x1080, 30 fps(r) | AAC, 48000 Hz, 2ch | 117 MB
Genre: eLearning | Language: English
Privileged accounts are high-value targets for attackers. This course will teach you about implementing PAM controls, including credential vaulting, session monitoring, and risk-based access management.
What you'll learn
Privileged accounts are a top target for attackers, and without proper controls, they can lead to devastating breaches and data loss. In this course, PAM Secure Implementation, you’ll learn to implement and manage key components of a Privileged Access Management (PAM) solution. First, you’ll explore how to secure credentials using vaulting techniques like encryption and hashing. Next, you’ll discover how to monitor and manage privileged sessions through recording, behavioral analytics, and risk scoring. Finally, you’ll learn how to deploy a basic PAM solution and configure both vaulting and session monitoring in a real-world environment. When you’re finished with this course, you’ll have the skills and knowledge of PAM implementation needed to help you secure privileged access in your organization.
More Info