Objective
According to Gartner, by 2022, 90% of organizations will recognize that mitigation of Privileged Access Management (PAM) risk is a fundamental security control, which is an increase from 70% today. Privileged accounts are the keys to the IT kingdom since they can provide the authenticated user with almost limitless privileged access rights across an organization’s most critical systems and data.
Part II of the PAM course contains thorough knowledge about the privileged account security controls, PAM solution partner considerations, how to baseline the PAM, and how to manage ongoing improvements. The course learnings include critical questions to answer when you start the PAM program, third-party PAM access requirements, insider threat considerations, and more. The course enhances your knowledge in protecting privileged accounts and privilege access management best practices.
In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning, followed by the end of the course final assessment.
For Corporate Request Demo →
What you will learn:
- Learn about privileges and how are they created, granted, etc.
- Learn about the capabilities of PAM software
- Study the PAM security controls
- Learn about the PAM solution partner considerations
- Study about the PAM baseline and ongoing Improvements
- Study the considerations for selection of PAM
- Learn how to protect privileged accounts

