Privileged Access Management:Mastering Security Fundamentals
https://DevCourseWeb.com
Published 6/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 867.59 MB | Duration: 2h 25m
Strengthening Security Foundations: A Comprehensive Course on Privileged Access Management
What you'll learn
Importance of PAM
Types of accounts
What are privileged accounts
Privileged Accounts - A target for cyber criminals
Different Types of Data Loss - PII, IP and Confidential Information
Ransomware
Compliance Failures Related to Regulations, Laws, or Internal Standards
Crypto Mining
PAM in case of COTS Applications
PAM in case of Servers
PAM in case of Databases
PAM in Case of Network Devices, Endpoints, IOT and ICS
Cloud Security: Protecting Your Organization from Data Breaches
Protecting Cloud Infrastructure
Securing Cloud Management Console and Root Accounts
Securing API Access Keys in the Cloud
Securing SAAS Applications
Securing the DevOps Pipeline
Building a Strong Foundation: Initiating a Privileged Access Security Project
Four Actions which Security Leadership Must Have For PAM Project
PAM Tool Investment
Requirements
Basic knowledge of IT
Basic understanding for information security concepts