IBM Verify Privilege Workshop (Thycotic Secret Server)
Audience
This training is aimed at security specialists and especially those who work with access control systems, identities and permits. Experience with other similar products such as IBM Access Manager is recommended.
Agenda
- Product architecture
- Understanding the PAM approach of the Secret Security Server
- Deploying the solution
- User operations
- Environmental management
- Remote passwords
- Discovering existing configurations
- Integration with Linux systems
- IBM Security Secret Server Launchers: RDP, SQL, SSH
- Audit functions
- Built-in reports
- System logs
- SIEM Integration (QRadar)
- Open laboratory
Duration of the course
The course is usually taught as a 2-day workshop. The contents and duration of the course can be modified at the request of our customers.
Instructors
All our training is delivered directly by our engineers. Only in this way can we guarantee the highest quality of our courses. The materials and laboratories we use are of our own making and based on our experience during the deployments, migrations and courses we have conducted over the last 12 years.