Skip to content

CyberArk CPM E-Learning

Learn how to create custom CyberArk CPM (Central Policy Manager) plugins for secure password rotation on unsupported systems, applications, and platforms. This advanced, practical training course is designed for PAM engineers, cybersecurity professionals, and DevSecOps teams seeking to extend CyberArk functionality across complex enterprise environments.
Students Enrolled1

Benefits of Self-paced Learning

Flexible learning time and place

Revisit any concept at any given time

Learn from the industry experts over the world

Get course completion certificate

Course Description

CyberArk is the industry leader in Privileged Access Management (PAM). The Central Policy Manager (CPM) component automatically rotates privileged account credentials. However, many systems and platforms—especially legacy or third-party ones—require custom plugin development to fully automate password management.

This course delivers comprehensive training on building, deploying, and troubleshooting CyberArk CPM plugins, giving you full control over credential rotation for any system, even those not supported natively.

What You'll Learn

  • Full understanding of CyberArk CPM plugin framework and architecture
  • How to create custom plugin files including .ini, .xml, and scripts
  • Writing secure scripts in PowerShell, VBScript, SSH, or Python
  • Mapping CyberArk Vault objects to plugin parameters
  • Step-by-step plugin deployment and version control
  • Debugging techniques using CPM logs, trace files, and execution reports
  • Securing plugin scripts to meet enterprise security and compliance standards

Target Audience

Pre-Requisites

  • Basic understanding of CyberArk PAM components (Vault, CPM, PSM)
  • Working knowledge of scripting (PowerShell, VBScript, Bash, or Python)
  • Familiarity with secure credential rotation workflows
  • Access to a CyberArk development or test environment is highly recommended

About Course

Learn how to create custom CyberArk CPM (Central Policy Manager) plugins for secure password rotation on unsupported systems, applications, and platforms. This advanced, practical training course is designed for PAM engineers, cybersecurity professionals, and DevSecOps teams seeking to extend CyberArk functionality across complex enterprise environments.
Show More

Course Content

CyberArk CPM

  • Part-1
    00:00
  • Part-2
    00:00
  • Part-3
    00:00
  • Part-4
    00:00
  • Part-5
    00:00
  • Part-6
    00:00
  • Part-7
    00:00
  • Part-8
    00:00
  • Part-9
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet

Frequently Asked Questions

Is prior CyberArk experience required?

Foundational knowledge of CyberArk components is helpful, but not mandatory. This course includes an introductory module.

Which scripting languages are used?

Primarily PowerShell and VBScript. Python and SSH are covered based on platform compatibility.

Is the course up to date with the latest CyberArk release?

Yes. The training is aligned with the latest CyberArk CPM plugin SDK and security standards.

Do I get a certificate?

Yes. A Certificate of Completion is provided and can be added to your resume or LinkedIn profile.

Can I apply this in real production environments?

Absolutely. The course is built around practical, real-world plugin development scenarios used by Fortune 500 companies and MSSPs.

TABLE OF CONTENTS

10,000.00 12,000.00
Enrollment validity: 365 days

Dear Learner

Take a step closer to glow and grow in your career
loader-infosectrain

Connect with Us

×

Dear Learner

loader-infosectrain

Connect with Us