Training

BeyondTrust Password Safe trainings

Learn more about the wide range of training options and courses we offer.

Password Safe Administration

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • On-site Training

This course is designed for the security professional tasked with administering, monitoring and reporting using Password Safe.During the course administrators learn how to configure Password Safe. This course includes hands-on lab with exercises for students to practice what they learn.This course is offered as a two-day on-site course, as a virtual course delivered over three days via five hour increments, or via eLearning.Students who successfully complete this course are eligible to take the associated BeyondTrust Certification exam.

Password Safe for Users

Available Training Types:

  • eLearning

The Password Safe for Users course is ideal for training privileged users on the Web Portal and their day-to-day use of Password Safe. During the course your privileged users will become knowledgeable in password rotation, session management, and navigating our BeyondInsight Web Portal.

Privilege Management for Unix/Linux

Available Training Types:

  • Private Dedicated Training
  • On-site Training

This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting on PowerBroker for Unix & Linux. Students learn how to install the products components, identify and edit configuration files, create policy for privilege delegation, install the components needed for I/O log review, and use the Analytics and Reporting from within BeyondInsight.

AD Bridge Foundations

Available Training Types:

  •     Private Dedicated Training
  •     On-site Training

The AD Bridge Foundations Training is designed for the IT security management professional tasked with administering, monitoring and reporting on AD Bridge. Students learn how to install and configure all product components, including the Management Console, Reporting Database and operating system Agents. They will connect a Unix host to Active Directory, create and configure Group Policy Objects, configure Active Directory users for Unix/Linux logon via console, SSH & PuTTY.

Privilege Management for Mac

Available Training Types:

  • Public Shared Training
  • Private Dedicated Training
  • On-site Training

This course is ideal for security professionals who need to learn how to deploy, configure, and utilize Privilege Management for Mac in their unique environment. During the course, administrators will learn best practices for installing and administering Privileged Management for Mac. This course is offered as a one-day on-site course or as a virtual course delivered over two days via four-hour increments.

Privileged Management for Windows

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • On-site Training

The course is ideal for security professionals who need to learn how to deploy, configure, and utilize Privilege Management for Windows in their unique environment. During the course, administrators will learn best practices for installing and administering Privileged Management for Windows. This course includes hands-on lab with exercises for students to practice what they learn.This course is offered as a two-day on-site course, as a virtual course delivered over four days via four hour increments, or via eLearning.Students who successfully complete this course are eligible to take the associated BeyondTrust Certification exam.