Course curriculum

    1. Introduction to Part 1

    2. Mastering Privileged Access Management Discovery & Assessment Phase

    3. PAM (Privileged Access Management) Discovery and Assessment phase.

    4. How Role-based analysis reviews can help with the PAM discovery phase of your project?

    5. How Reviewing existing privileged user lists can help with the PAM discovery phase of your project?

    6. How Active Directory reviews can help with the PAM discovery phase of your project?

    7. Identity and Access Management (IAM).

    8. Best Practices for Overcoming PAM Discovery & Assessment Challenges.

    9. Quiz

    10. Additional Resources

    1. Introduction.

    2. Mastering Privileged Access Management The Discovery Phase

    3. How SIEM and Syslog Tools Enhance Security

    4. How categorising privileged accounts by risk can help your PAM project?

    5. What Insights from SIEM & syslog tools can help your PAM project?

    6. Utilising Interviews & Surveys of Privileged Users for Effective PAM Program Design

    7. Account Information Needed when designing a PAM program.

    8. Importance of Acquiring Account Information case study.

    9. Asset Information Needed when designing a PAM program.

    10. Application Information Needed when designing a PAM program.

    11. Additional Resources.

About this course

  • £11.50
  • 21 lessons
  • 0 hours of video content

Discover your potential, starting today