Free
Privileged Access Management
In the Privileged Access Management (PAM) course, students will learn what PAM is, why it is used, and best practices for its uses. With hands-on labs, students will gain skills needed to ensure the security of access to an organization’s privileged information.
0
H
58
M
Time
intermediate
difficulty
0
ceu/cpe
Course Content
2.1 Introduction to Thycotic and how to Start Your PAM Journey Part 1
Module 2: Starting Your PAM Journey
1.1 Course Introduction
Module 1: Introduction
3.1 Discovery
Module 3: "Current Maturity" and Understanding PAM
2.2 Introduction to Thycotic and how to Start Your PAM Journey Part 2
Module 2: Starting Your PAM Journey
3.2 Classification System
Module 3: "Current Maturity" and Understanding PAM
2.3 Where to Start Your PAM Journey
Module 2: Starting Your PAM Journey
2.4 Technology
Module 2: Starting Your PAM Journey
Course Description
This course is designed to introduce to you Thycotic’s Privileged Access Management (PAM) solution.
Course Goals
By the end of the course, students should be able to:1. Why do organizations need to manage access? 2. Understand your business risk and what PAM means in your environment. 3. What's the delta between your original understanding of PAM and the reality?