Skip to content

CyberArk EPM E-Learning

Students Enrolled2

Benefits of Self-paced Learning

Flexible learning time and place

Revisit any concept at any given time

Learn from the industry experts over the world

Get course completion certificate

Course Description

CyberArk Endpoint Privilege Manager (EPM) enforces least privilege and enables organizations to block and contain attacks on endpoint computers, reducing the risk of information being stolen or encrypted and held for ransom.

What You'll Learn

 Workflow of sets

 PMI, Application Control and Threat Protection inbox

 Reduction of raw events

 Application groups

 Computer sets

 Policy creation

 Secure Token handling

 Agent configuration

 Server configuration

 Reports handling

 License management

 Integration of Azure AD with EPM

 CSV push automation from AWS to EPM

 JIT

 OPAG

Target Audience

The CyberArk Trustee certification program is designed for anyone interested in determining the security of privileged accounts.

Pre-Requisites

Privileged Accounts and/or Trustee Accounts in CyberArk.

Privileged Account Security Defender/Administration (CyberArk (PAS))

Sentry/Install and Configure CyberArk Privileged Account Security (PAS)

Course Content

CyberArk EPM

  • Part-1
    00:00
  • Part-2
    00:00
  • Part-3
    00:00
  • Part-4
    00:00
  • Part-5
    00:00
  • Part-6
    00:00
  • Part-7
    00:00
  • Part-8
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet

Frequently Asked Questions

What is the EPM Threat Protection module?

The EPM Threat Protection module is designed to detect and block specific application threats that could compromise your system’s security. It provides an additional layer of defense against malicious software and unauthorized activities.

What types of threats does it protect against?

The module covers a wide range of threats, including malware, ransomware, phishing attacks, and unauthorized access attempts. It monitors application behavior and enforces policies to prevent these threats from causing harm.

How do I activate threat protection policies?

To activate threat protection policies, follow these steps:

Log in to your CyberArk console.

Navigate to the EPM Threat Protection section.

Review the available policies and select the ones that best fit your organization’s needs.

Apply the policies to all endpoint computers or exclude specific computers as necessary.

TABLE OF CONTENTS

10,000.00 12,000.00
Enrollment validity: 82 days

Dear Learner

Take a step closer to glow and grow in your career
loader-infosectrain

Connect with Us

×

Dear Learner

loader-infosectrain

Connect with Us