Privileged access management (PAM) consists of the cybersecurity strategies and technologies for exerting control over the elevated (“privileged”) access and permissions for identities, users, accounts, processes, and systems across an IT environment.
Benefits of Self-paced Learning
Flexible learning time and place
Revisit any concept at any given time
Learn from the industry experts over the world
Get course completion certificate
Course Description
What You'll Learn
BeyondInsight Software and Hardware Requirements.
Set Up BeyondInsight Certificates.
Configure BeyondTrust Discovery Scanner Connections to BeyondInsight.
Configure BeyondInsight Analytics & Reporting.
Configure Privilege Management for Unix & Linux.
Configure Endpoint Privilege Management.
Configure AD Bridge.
Target Audience
The target audience for BeyondTrust’s PAM (Privileged Access Management) e-learning courses includes IT professionals, system administrators, and network administrators who want to enhance their technical and professional skills related to BeyondTrust products
Pre-Requisites
The prerequisites for BeyondTrust’s PAM e-learning courses vary depending on the specific course you’re interested in. However, here are some common prerequisites:
Basic IT Knowledge: A foundational understanding of IT concepts, networking, and system administration is beneficial.
Familiarity with Privileged Access Management (PAM): While not mandatory, having some knowledge of PAM solutions and their importance in securing privileged accounts will be helpful.
Experience with BeyondTrust Products: If you’re already using BeyondTrust solutions (such as Password Safe or Privileged Remote Access), you’ll find the courses more relevant. However, this isn’t a strict requirement.
Access to BeyondTrust Software: Some courses may involve hands-on labs or demonstrations using BeyondTrust software. Access to a lab environment or trial versions of the software can enhance your learning experience.
Course Content
Beyond Trust Pam E-Learning
-
Day-1
00:00 -
Day-2
00:00 -
Day-3
00:00 -
Day-4
00:00 -
Day-5
00:00 -
Day-6
00:00 -
Day-7
00:00 -
Day-8
00:00 -
Day-9
00:00 -
Day-10
00:00 -
Day-11
00:00 -
Day-12
00:00 -
Day-13
00:00
Student Ratings & Reviews
Frequently Asked Questions
Can LDAP queries be used to scale down the list of servers in my Systems list?
The Privileged Identity Suite makes use of dynamic groups for the automatic addition and removal of systems from the Systems list. The most flexible feature is the Active Directory Path query tool, which allows you to query not only a specific Organizational Unit (OU) for a set of systems but also creates a custom LDAP query to fine tune the Systems list.
How does licensing for Privileged Identity work?
When you purchase a commercial version of Privileged Identity, you receive a serial number, allowing you to manage a fixed number of systems. To view a dialog where you can see which systems are licensed and which systems are listed in your managed systems list, log into the admin console and go to Help > License Token Management > License Keys.
Why is the MAC address of my machine not displaying?
To obtain the MAC address from a Windows system, the NetBIOS name must be retrieved. If NetBIOS is disabled, the MAC address cannot be retrieved and appears as an empty value or as all zeroes.
Why am I seeing the message More than one instance of this program detected?
This message appears by design. Privileged Identity does not provide its own networking and is reliant upon Windows networking. The host system uses whatever connection is available, which also means authentication is already complete when the connection is established. If two people were allowed to launch the management console at the same time, without this check in place the two users would be able to manage each other’s systems.
-
LevelIntermediate
-
Last UpdatedFebruary 7, 2025
-
CertificateCertificate of completion