QineticEDGE

— Learn

Welcome to the QineticEDGE IT Training Hub!

Are you inclined to rush into a job without considering its long-term sustainability? Do you thrive on the challenge of preparing intensively for the job market, such as through a boot camp? Which personality best describes you?

Accelerate your Career with immersive training in Identity Security and Access Management skills with hands-on training, comprehensive interview preparedness, and extended access to the course content for the long term. Students master CyberArk and relevant technologies that increase their value to potential employers, strategically positioning them for career success, and empowering them to shape the future they envision.

— MEET THE LEAD INSTRUCTOR

My Journey

I’m Bella Bakare, and I’m thrilled to be your lead guide on an incredible journey into the world of Information Technology. With years of expertise spanning ERP Governance, Risk and Compliance (GRC), Identity and Access Management (IAM), and Privilege Access Management (PAM), I bring a wealth of knowledge and practical experience to the table.

Having embarked on a transformational journey, I understand the power of resilience and hard work. After relocating to the US in 2011 and initially working as a caregiver, I discovered the boundless opportunities in the IT industry. A single IT training course reshaped my career trajectory, propelling me from a $12-an-hour job to a six-figure salary. I achieved the American Dream, and my mission now is to empower you to do the same.

YOUR PATH TO SUCCESS: Whether you’re an aspiring IT enthusiast with no prior experience or an experienced professional looking to switch careers, my team and I are here to guide you. Our specialized coaching and tutoring cater to helping you break into the IT workforce or transition seamlessly. The focus? Identity Security and Privilege Access Management (PAM), pivotal domains in the realm of Cybersecurity.

WHY CYBERARK? Identity Security and PAM aren’t just buzzwords; they’re essential safeguards for modern businesses. In a digital landscape rife with threats, a robust identity strategy is non-negotiable for survival. Under our guidance, you’ll be equipped to excel in this high-demand field, regardless of your previous IT experience, or NOT.

UNIQUE TRAINING APPROACH: Picture this: 80% hands-on training, mock interviews, extended interview preparation, resume training, and immersion in industry tools. Our aim is to prepare you for the job interview of your dreams, arming you with skills that make you stand out.

COMMUNITY OF SUCCESS: My team’s collective track record speaks for itself. From novices stepping into the IT world to IT contractors commanding multiple roles simultaneously, We have nurtured a community of thriving professionals. Your success story is waiting to be written, and we are here to ensure it’s a tale of triumph.

JOIN OUR SUCCESS PARADE: Are you ready to seize your slice of the IT pie? Enroll now and join the Qinetic EDGE community of empowered individuals. My certifications, including PMP, CyberArk CDE-PAM, and CyberArk CDE-Privilege Cloud, attest to my expertise and commitment to your growth.

Your IT transformation CAN start here, and I would be honored to be your coach.

Thanks and Kind Regards,

Bella Ade-Bakare

Get in Touch

Reach out to the QineticEDGE team

WhatsApp: +1 7738277231
Email: qineticedge@gmail.com
Address: 15 S Howard Ave Roselle IL 60172

COURSE CURRICULUM

The Identity Security and Access Management Boot Camp is a comprehensive 22-week program with a strong emphasis on hands-on learning through weekly group coaching sessions.

A glimpse of what you'll ​be learning:

CyberArk PAM Deployment

Learn how to deploy your CyberArk PAS environment with the EPV vault installation and CyberArk component servers such as the PVWA, CPM, PSM, among others.

Installation of VMware Workstation for virtualization
1.1. System Configurations for Your Virtual Lab
Setting up the necessary configurations to establish your virtual lab environment
1.2. VMware Workstation 
Installation of VMware Workstation PRO
1.3. Windows Server Installation
Installing the Windows Server operating system for use in your lab
1.4. Windows Server Activation
Activating the Windows Server installation

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

3.1. PVWA Pre-requisites
– Identifying and ensuring the prerequisites for PVWA installation.
3.2. PVWA Installation
– Step-by-step installation guide for Password Vault Web Access.
3.3. PVWA Main Configurations
– Configuring PVWA for optimal performance and security.
3.4. PVWA In-built Safes Overview
– Understanding the built-in safes within PVWA.
3.5. PVWA In-built Users
– Managing built-in users within PVWA.
3.6. IIS Applications Overview
– Exploring IIS (Internet Information Services) applications in the context of PVWA.
3.7. Certificate Binding
– Configuring SSL certificates for secure PVWA access.
3.8. PVWA Interface
– Navigating and customizing the PVWA user interface.
3.9. PVWA Operational Tasks
– Performing essential operational tasks within PVWA.
3.10. CyberArk Safes, Master Policies, Platform Settings Overview
– Understanding safes, policies, and platform settings in the CyberArk ecosystem.
3.11. Changing the PVWA Login Screen Logo
– Customizing the PVWA login screen with your organization’s logo.
3.12. PVWA Login Message
– Configuring a custom or client-specific login message for PVWA
3.13. PVWA Hardening
– Enhancing security measures and hardening PVWA.
3.14. PVWA Services
– Managing and configuring services related to PVWA.

4.1. CPM Pre-requisites
– Identifying and ensuring the prerequisites for CPM installation.
4.2. CPM Installation
– Step-by-step installation guide for Central Policy Manager (CPM).
4.3. CPM Main Configurations
– Configuring essential settings and options within CPM.
4.4. CPM In-built Safes
– Understanding and working with in-built safes in CPM.
4.5. CPM In-built User
– Managing and configuring users within the Central Policy Manager.
4.6. CPM Scanner Service Troubleshooting
– Troubleshooting common issues related to the CPM Scanner Service.
4.7. CPM Operational Tasks
– Performing essential operational tasks within CPM.
4.8. Safes & CPM Master Policies
– Understanding the role of safes and master policies in CPM.
4.9. Changing Accounts’ Password
– Demonstrating the process of changing accounts’ passwords using CPM.
4.10. CPM Hardening
– Implementing additional security measures and best practices to harden CPM.
4.11. CPM Services
– Managing and configuring services related to Central Policy Manager.

5.1. PSM Installation
– Step-by-step guide for installing Privileged Session Manager (PSM).
5.2. PSM Pre-requisites
– Identifying and ensuring the prerequisites for PSM installation.
5.3. PSM In-built Safes
– Understanding and working with in-built safes in PSM.
5.4. PSM In-built Users
– Managing and configuring users within Privileged Session Manager.
5.5. Privileged Session Manager (PSM) Service
– Overview and configuration of the PSM service.
5.6. PSM Shadow User
– Configuring and using shadow user accounts for monitoring sessions.
5.7. PSM Ports
– Explanation of ports used by PSM and their configurations.
5.8. Pointing the Connection to One PSM in a Load Balanced Environment
– Ensuring session connections are directed to a specific PSM in a load-balanced setup.
5.9. PSM Workflow
– Understanding the workflow and processes involved in PSM.
5.10. Platform Policy
– Implementing platform-specific policies in PSM.
5.11. PSM Connect Password
– Configuring and managing connect passwords for sessions.
5.12. PSM Configuration
– Configuration options and settings within PSM.
5.13. PSM RDP Connection
– Establishing remote desktop protocol (RDP) connections through PSM.
5.14. PSM Session
– Managing and monitoring privileged sessions using PSM.
5.15. PSM Hardening
– Implementing additional security measures and best practices to harden PSM.

6.1. AD Users and Computers
– Navigating and managing Active Directory users and computers.
6.2. How to Promote a Server to a Domain Controller
– Step-by-step guide on promoting a server to a domain controller within Active Directory.
6.3. Adding a Computer to a Domain (Server 2012)
– Adding computers to an Active Directory domain on a Windows Server 2012 system.
– Managing Active Directory accounts and permissions within CyberArk.

7.1. Disaster Recovery (DR) Vault Pre-requisites
– Identifying and ensuring the prerequisites for Disaster Recovery Vault installation.
7.2. DR Vault Installation
– Step-by-step guide for installing Disaster Recovery Vault.
7.3. DR Main Configurations Files
– Configuring essential settings and files within Disaster Recovery Vault.
7.4. Disaster Recovery (DR) Ports
– Understanding the ports used in Disaster Recovery Vault.
7.5. DR Full/Incremental Replication
– Implementing full and incremental replication for Disaster Recovery.
7.6. DR User Overview
– Managing users in the Disaster Recovery Vault.
7.7. Disaster Recovery (DR) Vault Concept
– Understanding the concept and purpose of Disaster Recovery Vault.
7.8. Production Vault & DR Vault Identical Settings
– Ensuring identical settings between Production Vault and Disaster Recovery Vault.
7.9. DR Vault Service
– Managing and configuring services in the Disaster Recovery Vault.
7.10. Routing the PVWA, PSM to DR Vault
– Configuring routing for PVWA and PSM to the Disaster Recovery Vault.
7.11. DR Padr.ini
– Understanding the Padr.ini configuration in Disaster Recovery.
7.12. How DR Vault Checks if Production Vault Server is Active or Inactive
– Explaining how Disaster Recovery Vault determines the status of the Production Vault Server.
7.13. DR Vault PADR Log Files
– Managing and interpreting PADR log files in the Disaster Recovery Vault.
7.14. Creating a new DR user for Production Vault
– Step-by-step guide on creating a new user for the Production Vault in Disaster Recovery.

8.1. Failover and Failback
– Understanding the concepts of failover and failback in Disaster Recovery.
8.2. What is DR Drill
– Explaining the purpose and process of a DR drill.
8.3. DR Predefined or Manual Failover
– Differentiating between predefined and manual failover in Disaster Recovery.
8.4. DR Automatic Failover
– Understanding automatic failover in Disaster Recovery.
8.5. DR Partial Failover Concept
– Explaining the concept of partial failover in Disaster Recovery.
8.6. Why DR Failback is always Manual?
– Discussing the reasons behind manual failback in Disaster Recovery.
8.7. DR PVWA/PSM/CPM Failover Concept
– Understanding the failover concept for PVWA, PSM, and CPM in Disaster Recovery.

9.1. Centos 7 Installation Step by Step
– Step-by-step guide for installing CentOS 7.
9.2. Centos Installation on VMware
– Installing CentOS on a VMware virtual machine.
9.3. PSMP Pre-requisites
– Identifying and ensuring the prerequisites for PSMP installation.
9.4. PSMP Installation or PSM for SSH Installation
– Installing PSMP or PSM for SSH.
9.5. PSMP Installation
– Detailed installation guide for Privileged Session Manager for SSH.
9.6. PSMP ADBridge
– Configuring the Active Directory Bridge in PSMP.
9.7. PSMP Repair Procedure
– Repair using command line scripting or PowerShell prompt
9.8. PSMP Configuration
– Configuration options and settings within PSMP.
9.9. PSMP Install Logs
– Examining installation logs for troubleshooting.
9.10. PSMPConsole Logs
– Analyzing console logs for diagnosing issues.
9.11. PSMPTrace Logs
– Reviewing trace logs for troubleshooting and auditing.
9.12. AD Bridge Configuration File
– Configuring the Active Directory Bridge configuration file.
9.13. PSMP Uninstall
– Uninstalling PSMP when necessary.
9.14. WinSCP File Transfer
– Using WinSCP for secure file transfers.

10.1. CP Installation
– Installing the Credential Provider (CP) for AAM.
10.2. Password SDK
– Understanding the Password Software Development Kit (SDK) used in AAM.
10.3. Types of Credential Providers – CP, CCP, ASCP
– Exploring different types of Credential Providers including CP, CCP, and ASCP.
10.4. CyberArk AIM Tool
– Introduction to the CyberArk Application Identity Manager (AIM) Tool.
10.5. AIM Installation Guide
– Step-by-step guide for installing the Application Identity Manager (AIM).
10.6. AIM Agent Installation
– Installing AIM agents for identity management.
10.7. AIM vs. AAM
– Comparing and contrasting Application Identity Manager (AIM) with Application Access Manager (AAM).
10.8. CCP vs. CP
– Understanding the differences between Central Credential Provider (CCP) and Credential Provider (CP).

11.1. Install the Vault Backup Utility
– Step-by-step guide for installing the Vault Backup Utility.
11.2. Replicate Utility
– Understanding the Replicate Utility for data replication.
11.3. Backup Key
– Managing backup encryption keys for data security.
11.4. Replicate Log File
– Exploring log files generated during the replication process.
11.5. Backup Script
– Creating and configuring backup scripts for automated backups.
11.6. Incremental Backup
– Performing incremental backups to save time and resources.
11.7. Full Backup
– Performing full backups for comprehensive data protection.

12.1. How To Restore a Full Vault using PA Restore
– Step-by-step guide for restoring a full vault using the PA Restore tool.
12.2. How To Restore a Single Safe using PA Restore
– Restoring individual safes using PA Restore.
12.3. Restore from Backup
– Initiating a restore process from a backup file.
12.4. Restore Deleted Account
– Recovering deleted accounts from backup.
12.5. Restore Safe
– Restoring specific safes from backup.
12.6. Full Vault Restore
– Performing a complete vault restoration.
12.7. Restore Database
– Restoring the vault database for data recovery.

These topics will provide a foundational understanding of REST APIs and their application using the Postman tool, specifically within the context of CyberArk.

13.1. REST APIs using Postman
– Introduction to REST APIs and their usage with Postman.
13.2. REST API Calls using Postman
– Performing REST API calls using the Postman tool.
13.3. REST API Collections
– Understanding and working with REST API collections in Postman.
13.4. Overview of CyberArk REST API
– An overview of the RESTful API provided by CyberArk.
13.5. Get Platform Details using Rest API
– Demonstrating how to retrieve platform details using the CyberArk REST API.

COURSE CURRICULUM

Starting a career in tech might seem daunting, but it's entirely within your reach. YOU HAVE THE POTENTIAL. We will impact practical skills and knowledge that will set you apart among candidates. All we ask is that you commit to 22 Weeks of great learning.

Explore more of our PAM offering:

CyberArk PAM Administration

Learn how to deploy your CyberArk PAS environment with the EPV vault installation and CyberArk component servers such as the PVWA, CPM, PSM, among others.

1.1. Safe Creation using PUU
– Creating safes using the PrivateArk User Interface (PUU).
1.2. Safe Creation using PACLI
– Creating safes using the PACLI command-line interface.
1.3. Safe Creation using PowerShell Scripts
– Using PowerShell scripts to automate the creation of safes.
1.4. Safe Creation using API Collections
– Leveraging API collections to create safes programmatically.
1.5. Safe Retention
– Managing safe retention policies for data security and compliance.
1.6. Safe Permissions and Access
– Configuring permissions and access controls for safes.
1.7. – 7.8. Safe Naming Convention
– Establishing and adhering to safe naming conventions for consistency.
1.9. Safe Deletion
– Safely deleting unused or unnecessary safes
1.10. Deleted Accounts Safe
– Exploring the use of the Deleted Accounts Safe for managing deleted accounts securely.

2.1. Account Onboarding – Manually
– Manually onboarding privileged accounts into CyberArk.
2.2. Account Onboarding – PUU
– Onboarding accounts using the PrivateArk User Interface (PUU).
2.3. Account Onboarding – Powershell Scripts
– Automating account onboarding with PowerShell scripts.
2.4. Account Discovery
– Discovering and identifying privileged accounts for onboarding.
2.5. Domain Account Onboarding
– Onboarding domain accounts into CyberArk.
2.6. Local Windows Account Onboarding
– Onboarding local Windows accounts.
2.7. Linux Account Onboarding
– Onboarding Linux accounts.
2.8. Service Account Onboarding – Windows Service
– Onboarding Windows service accounts.
2.9. Service Account Onboarding – Scheduled Tasks
– Onboarding scheduled task accounts.
2.10. Database Account Onboarding
– Onboarding database accounts.
2.11. Network Device Onboarding
– Onboarding network device accounts.
2.12. Account Offboarding
– Managing the offboarding process for privileged accounts.
2.13. Logon Account Association
– Associating logon accounts with privileged accounts.
2.14. Account Unlock
– Unlocking locked accounts when necessary.
2.15. Account Check-in/Check-out
– Implementing account check-in and check-out procedures.
2.16. Session Connection to Endpoints
– Establishing secure session connections to endpoints.
2.17. Password Retrieval – Show and Copy
– Retrieving passwords using the “Show” and “Copy” functions.
2.18. End User Password Reset
– Allowing end users to reset their passwords securely.
2.19. Service Account Requirements Gathering
– Gathering requirements for effective management of service accounts.
2.20. Managed vs Unmanaged Privileged Accounts
– Understanding the difference between managed and unmanaged privileged
accounts.
2.21. Active Directory Administration

3.1. CyberArk Policies Overview
– An introduction to CyberArk policies and their importance
3.2. Platform Management Policy
– Exploring the Platform Management Policy in CyberArk.
3.3. Platform Password Policy
– Understanding the Password Policy for platforms in CyberArk.
3.4. Platform Policy Exception
– Handling policy exceptions within the platform.
3.5. CyberArk Platform Types
– An overview of different platform types within CyberArk.
3.6. CyberArk Master Policy Settings
– In-depth exploration of Master Policy settings in CyberArk.
3.7. Health Checks and Monitoring
– Monitoring the health and performance of CyberArk systems.
3.8. Password Complexity Policy
– Configuring password complexity policies in CyberArk.
3.9. Switch Platforms for Onboarded Accounts
– Managing the switching of platforms for onboarded accounts.
3.10. Password Changes
– Handling password changes within CyberArk.
3.11. Password Verification
– Verifying passwords in accordance with CyberArk policies.
3.12. Password Reconciliation
– Implementing password reconciliation processes.
3.13. Platform Configuration Options
– Exploring various platform configuration options.
3.14. Custom Platform Creation
– Creating custom platforms tailored to specific requirements
3.15. Master Policy Deep Dive
– A comprehensive dive into Master Policies, covering advanced configurations and settings.

4.1. CyberArk Report Generation
– Generating reports within the CyberArk platform.
4.2. PVWA Reports Generation
– Creating reports specific to the Privileged Web Access (PVWA) component.
4.3. CyberArk Inventory Report Review
– Reviewing and understanding CyberArk inventory reports
4.4. CyberArk Compliance Report Review
– Analyzing and interpreting compliance reports in CyberArk.
4.5. Report Definitions and Understanding
– Understanding the definitions and significance of various report types.
4.6. PrivateArk Reports
– Exploring reports generated by PrivateArk, a key component of CyberArk.

5.1. Manage dbparm.ini Configuration File
– Managing and configuring the dbparm.ini configuration file.
5.2. How to Read Component Server Logs
– Understanding how to read and interpret logs generated by component servers.
5.3. How to Read Vault Logs
– Interpreting logs generated by the CyberArk Vault for troubleshooting and monitoring.
5.4. Create New CredFile
– Creating new credential files for secure storage and management.
5.5. Navigate Configuration Files
– Navigating and understanding various configuration files within the CyberArk environment.
5.6. Understand Installer Files
– Gaining insights into installer files used for CyberArk installations and updates.
5.7. Expired License Resolution
– Addressing and resolving issues related to expired licenses in CyberArk.

6.1. PrivateArk Client Administration
– Administering and managing the PrivateArk client.
6.2. Server Central Administration
– Overview of central administration for CyberArk servers.
6.3. Trusted Network Area Activation
– Activating trusted network areas for enhanced security.
6.4. License Capacity Report
– Generating and interpreting license capacity reports.
6.5. Activate Suspended Accounts
– Activating accounts that have been suspended for security reasons.
6.6. CyberArk Authentication Methods
– Exploring authentication methods employed by CyberArk.
6.7. CyberArk Services and Management
– Managing and overseeing various services within the CyberArk ecosystem.

7.1. LDAP Integration
– Integrating LDAP (Lightweight Directory Access Protocol) for user management.
7.2. LDAP Directory Mapping
– Mapping LDAP directories for efficient user access control.
7.3. SMTP Integration
– Integrating SMTP (Simple Mail Transfer Protocol) for email functionality.
7.4. SMTP Setup
– Setting up SMTP configurations within CyberArk.
7.5. Notification Engine
– Understanding the notification engine for alerting and notifications.
7.6. Notification Agent Rules
– Creating and managing notification agent rules for specific events.

8.1. PVWA Certificate Management
– Managing certificates in the Privileged Web Access (PVWA) component.
8.2. PVWA Certificate Update
– Updating certificates within PVWA for security and functionality.
8.3. PVWA Certificate Changes
– Handling changes and updates to PVWA certificates.
8.4. PVWA SSL Certificate
– Configuring SSL certificates for PVWA security.
8.5. IIS Reset
– Performing IIS (Internet Information Services) resets for certificate-related changes.

9.1. Vault Services
– An overview of services within the CyberArk Vault.
9.2. Firewall Ports
– Understanding firewall ports and their role in CyberArk.
9.3. Password Vault Vulnerability
– Identifying and addressing vulnerabilities in the Password Vault.
9.4. Component Servers Vulnerability– Addressing vulnerabilities related to component servers in CyberArk.
9.5. Vault Replication
– Exploring the process of vault replication within CyberArk.
9.6. Disaster Recovery Failback
– Understanding the disaster recovery failback process.

10.1. CyberArk Classic Interface
– Navigating and utilizing the CyberArk Classic Interface.
10.2. CyberArk V10 Interface
– Exploring the features and functionality of the CyberArk V10 Interface.

11.1. Linux Command Line Prompts
– Familiarizing yourself with Linux command line prompts for troubleshooting.
11.2. Issues Troubleshooting and Resolution
– Techniques for troubleshooting and resolving issues in CyberArk.
11.3. CPM Password Change Errors
– Addressing and resolving errors related to Central Policy Manager (CPM) password changes.
11.4. CPM Split Brain Scenario
– Managing and mitigating the split-brain scenario in Central Policy Manager (CPM).
11.5. Excel VLOOKUP Exercise
– Practicing VLOOKUP functions in Excel for data analysis.
11.6. Excel Concatenation Exercise
– Exercise focused on using concatenation in Excel for data manipulation.

COURSE CURRICULUM

We encourage all learners to take the Endpoint Privilege Management (EPM) course. We cover theory and implementation, and EPM concepts and practices. These topics provide hands-on experience and practical guidance.

Breakdown of our course modules:

Endpoint Privilege Management

Learn how to deploy your CyberArk PAS environment with the EPV vault installation and CyberArk component servers such as the PVWA, CPM, PSM, among others.

1.1. High-level Product Overview
– An overview of the Endpoint Privilege Manager (EPM) at a high level.
1.2. Introduction to Endpoint Privilege Manager
– Introduction to the Endpoint Privilege Manager, its purpose, and significance.
1.3. Architecture Insight (SaaS)
– Insight into the architecture of EPM, with a focus on Software as a Service (SaaS).
1.4. Basic Concepts (e.g., Privilege Management, Application Control, Threat Protection)
– An exploration of fundamental concepts including Privilege Management, Application Control, and Threat Protection within EPM.
1.5. Lab Enablement
– Enabling and setting up a lab environment for practical learning and experimentation.

2.1. In-depth Detailing of Key Concepts
– A comprehensive dive into key concepts within EPM
2.2. Action Definition
– Detailed explanation of Action Definition in EPM.
2.3. Application Group
– In-depth exploration of Application Groups in EPM.
2.4. Events Management
– Understanding the management of events within EPM.
2.5. Set and Role
– Detailed examination of Sets and Roles in EPM.
2.6. Least Privilege Concept and How EPM Helps
– Exploring the concept of least privilege and how EPM assists in its implementation.

3.1. Collecting Business Requirements
– The process of gathering and documenting business requirements for EPM implementation.
3.2. Account Administrator
– Roles and responsibilities of the Account Administrator in EPM.
3.3. Set Administrator
– Roles and responsibilities of the Set Administrator in EPM.
3.4. Endpoint User
– Understanding the roles and responsibilities of the Endpoint User in the EPM environment.
3.5. Working on Pre-checklist Before Deployment: Working on UAC GPO, etc.
– Preparing and working on a checklist before deploying EPM, including configuring User Account Control (UAC) Group Policy Objects (GPO).

4.1. Creating Sets
– Step-by-step guidance on creating sets in Endpoint Privilege Manager (EPM).
4.2. Creating Role
– Instructions for creating roles within EPM.
4.3. Access Provisioning to New Resources
– Hands-on experience with provisioning access to new resources using sets and roles.
4.4. Managing Sets
– Techniques and best practices for managing sets effectively.

5.1. Default Policies
– Practical exercises related to default policies in EPM.
5.2. Advanced Policies
– Hands-on exploration of advanced policy creation within EPM.
5.3. QuickStart Policies
– Creating QuickStart policies and understanding their application.
5.4. User Policies
– Hands-on experience with creating user-specific policies.

6.1. Download the Agent Setup
– Guidance on downloading the Endpoint Privilege Manager (EPM) agent setup.
6.2. Installation of Agent
– Step-by-step instructions for installing the EPM agent.
6.3. Approach and Planning of Agent Deployment in Bulk
– Strategies and planning considerations for deploying EPM agents in bulk.
6.4. Key Points to Handle Agent Deployment
– Important points and considerations for successfully handling agent deployment.
6.5. Handling End-User Communication
– Best practices for communicating with end-users during the agent deployment process.

7.1. Overview of Application Control
– An overview of Application Control within the Endpoint Privilege Manager (EPM) environment.
7.2. Approach to Implement Application Control
– Strategies and approaches for implementing effective Application Control.
7.3. Collect the Required Known Allowed, Blocked Apps/Details
– Gathering necessary information about known allowed and blocked applications.
7.4. Create Global Allow Rules
– Hands-on experience with creating global allow rules for applications.
7.5. Create Global Deny Rule
– Practical exercises on creating global deny rules for applications.
7.6. Handling End-User Communications
– Best practices for communicating changes in application control to end-users.
7.7. Analysis of Application from CyberArk EPM During Discovery
– Analyzing applications and their behavior within the CyberArk EPM environment during the discovery process.

8.1. Overview of Threat Protection Inbox
– An overview of the Threat Protection Inbox feature.
8.2. Managing and Administration of Threat Protection Inbox
– Practical guidance for managing and administering the Threat Protection Inbox.
8.3. Blocking and Allowing Threat Events
– Hands-on exercises for blocking and allowing threat events in the Threat Protection Inbox.

9.1. JIT Access Overview
– An overview of Just In Time (JIT) Access and its significance.
9.2. How to Create JIT Access
– Step-by-step guidance on creating JIT access within the EPM environment.
9.3. Key Considerations and Constraints
– Understanding key considerations and constraints when implementing JIT access.

10.1. Creation of Policies with Use Case Scenarios
– Practical exercises on creating policies for different use case scenarios.
10.2. Creation of Policies for Mac OS and Windows Servers
– Hands-on experience with policy creation specifically for Mac OS and Windows Servers.
10.3. Deploying Policies to Signal Users and Multiple User Priority
– Deploying policies to notify users and managing priorities for multiple users.
10.4. Tips and Tricks of Policy Creation and Deployment
– Tips, tricks, and best practices for policy creation and effective deployment.

11.1. Overview of Credentials Rotation
– An introduction to the concept of credentials rotation.
11.2. Managing and Administration of Credentials Rotation
– Practical guidance on managing and administering credentials rotation.
11.3. Policy Creation for Credentials Rotation
– Hands-on experience with creating policies for credentials rotation.
11.4. Use Case Scenarios of Credentials Rotation
– Exploration of use case scenarios related to credentials rotation.

12.1. Approach of Local Admin Rights Removal
– Strategies and approaches for the removal of local admin rights.
12.2. Key Considerations
– Important considerations when implementing the removal of local admin rights.

13.1. Privilege Management Reports
– An overview of reports related to privilege management.
13.2. Application Control Reports
– An overview of reports related to application control.
13.3. Application Catalog Reports
– An overview of reports related to the application catalog.
13.4. Policies Reports
– Understanding reports related to policies.
13.5. Threat Protection Reports
– Overview of reports related to threat protection.
13.6. My Computers Reports
– An overview of reports related to user computers.
13.7. Threat Intelligence Reports
– Understanding reports related to threat intelligence.
13.8. Policy Audit Reports
– An overview of reports related to policy audits.
13.9. CyberArk EPM Admin Audit Reports
– Reports focusing on CyberArk EPM admin audits.

14.1. Creation of Custom Reports
– Hands-on experience with creating custom reports.
14.2. Managing and Administration of Reports
– Practical guidance on managing and administering reports.
14.3. User Case Scenario of Reports
– Exploring real-world user case scenarios for reports.
14.4. Unhandled Reports
– Addressing unhandled reports and issues.
14.5. Overview of Summary Dashboard
– An overview of the summary dashboard.
14.6. Overview of General Dashboard
– Introduction to the general dashboard.
14.7. Creating General Dashboard
– Hands-on experience with creating a general dashboard.
14.8. Overview of Threat Protection Dashboard
– An overview of the threat protection dashboard
14.9. Creating Threat Protection Dashboard
– Practical exercises on creating a threat protection dashboard.

15.1. Managing and Administration of My Computers
– Practical guidance on managing and administering My Computers within the Endpoint Privilege Manager (EPM) environment.
15.2. Creating Groups and Policies for Computers
– Hands-on experience with creating groups and policies for computer management.
15.3. Upgrade or Uninstall Agents
– Instructions for upgrading or uninstalling agents in the EPM environment.

16.1. Overview of Threat Intelligence
– An introduction to the concept of Threat Intelligence.
16.2. Threat Intelligence Integration Settings for CyberArk
– Practical exercises on configuring Threat Intelligence integration settings in CyberArk.
16.3. CyberArk Application Risk Analysis Service
– Exploring the CyberArk Application Risk Analysis Service.
16.4. VirusTotal
– Understanding how to use VirusTotal within the EPM environment.
16.5. National Software Reference Library (NSRL)
– An overview of the National Software Reference Library and its relevance in threat intelligence.

17.1. Overview of Policy Audit
– An overview of policy audit capabilities within EPM.
17.2. Policy Audit on Executables, Scripts, DMG, Script, MSI/MSP/PKG Installation, MS Update (MSU), ActiveX Installation, COM Object, Admin Task, User Request
– Hands-on experience with policy audits on various elements including executables, scripts, and more.
17.3. Tips and Tricks in Policy Audit
– Tips and tricks for optimizing policy audits.
17.4. Use Case Scenario of Policy Audit
– Exploration of use case scenarios for policy audits.

18.1. Overview of End-user UI and Configuration Dialogs
– An overview of the end-user UI and configuration of dialog windows for policies.
18.2. Customize Dialog Windows for Policies
– Hands-on experience with customizing dialog windows for policies.
18.3. Balloons – Customize Balloon Popup Messages
– Practical guidance on customizing balloon popup messages.
18.4. Web Pages and Web-Based Elevation Messages
– How to create and configure web-based elevation messages.

19.1. Overview of Advanced Configuration
– An introduction to advanced configuration options.
19.2. Agent Configuration
– Changing global EPM configuration parameters and applying them to all computers.
19.3. Server Configuration
– Modifying CyberArk EPM Management parameters.
19.4. Video Recording Configuration
– Configuring video recording parameters.
19.5. Custom Tokens
– Creating custom tokens for use in EPM.
19.6. My Account

20.1. Collecting and Reviewing Log Files
– Practical steps for collecting and reviewing log files.
20.2. Agent Command Line Options
– Understanding agent command line options.
20.3. Policy and Elevation Troubleshooting
– Troubleshooting policy and elevation-related issues.
20.4. Connectivity Issues
– Addressing connectivity issues in EPM.
20.4. Browser Configuration
– Configuring web browsers for optimal EPM functionality.

A quick overview of our course content and by no means an exhaustive list. We breakdown some of the highlights of our training curriculum by packages.

Breakdown of our course modules:

COURSE PACKAGES

PAM
EPM
CPC

VMware Configuration and Server Installation

Vault Installation & Configurations

PVWA Installation & Configurations

CPM Installation & Configurations

Active Directory & PSM Installations

DR Vault Installation & Configurations

Linux Server & PSMP Installations

AAM Installation – (Central) Credentials Provider

Disaster Recovery Failover and failback

Vault Backup/Replicate Utility

Vault and Component Servers Upgrade

REST APIs using Postman

CyberArk EPM Overview

Set Definition and Agent Deployment

Privilege Management and Application Control

Credential Theft Protection and Monitoring

Sets and Events Management

Policies Creation and Agent Deployment

Just In Time Access

Credentials Rotatin - Loosely Connected Devices

My Computers

Threat Intelligence and Troubleshooting

Managing and Administration of My Computers

Privilege Cloud Architecture

Privilege Cloud Identity Dashboard and Console

Identity Administration Console

Roles, Policies and User Management

Identity Connector and Connector Management

Active Directory and SIEM Integration

Multifactor Authentication (MFA) Configuration

Workforce Password Management

Mobile Applications Integration

PROGRAM BONUSES

  1. In-Depth Exploration of the CyberArk Technical Community: We provide a detailed walkthrough of the CyberArk Technical Community, ensuring you can tap into this valuable resource effectively.

  2. Comprehensive Guide on How to Create a CyberArk Case – Ticketing Support: Learn how to initiate and manage support cases, ensuring you receive timely assistance when needed.
  3. CyberArk Version Upgrade Guidance: Stay up to date with the latest CyberArk versions and learn how to perform smooth upgrades.

  4. Coaching on Understanding CyberArk Cloud Architecture: Get insights into CyberArk’s cloud architecture to better navigate its cloud-based solutions.

  5. Guidance on Setting up NTP Server: Ensure your CyberArk environment runs smoothly with proper NTP server setup

  6. Understanding CyberArk Engagement’s Project Management Workflow: Gain insights into the project management workflow within CyberArk engagements.
  7. Extended Interview Support (2 – 6 Weeks): Receive additional support for job interviews to increase your chances of success.

  8. 80% Hands-On Coaching within 10 – 22 Weeks of Sessions: Our program prioritizes hands-on learning to ensure you gain practical skills.

  9. Live Mock Interviews and Role Play: Prepare for real-world scenarios through live mock interviews and role-playing exercises.

  10. Class Session Recordings with 1-Year Program Access: Access recordings of class sessions for up to a year, allowing you to review and reinforce your learning.

  11. Resume Coaching, Job Search Strategies, and Certification of Completion: Receive guidance on crafting an impressive resume, effective job search strategies, and a certification of completion upon successfully finishing the program.

EMBRACE FINANCIAL FREEDOM

In just 22 weeks, you can acquire the essential skills necessary to seek employment that promises unprecedented earnings and paves the way towards financial independence.

OUR oFFERING:

Get in Touch

Reach out to the QineticEDGE team

WhatsApp: +1 7738277231
Email: qineticedge@gmail.com
Address: 15 S Howard Ave Roselle IL 60172

Privilege Access Management (PAM)

Privilege Access Management (PAM) Operations and Administration are the best courses available to learn and develop practical skills that are needed to kickstart a career in CyberArk. The courses feature a comprehensive variety of innovative, hands-on labs, and practical exercises that go beyond what is offered in any other similar training. This segment of our 3-part course curriculum provides you the knowledge to thrive as a level 2 CyberArk Engineer.

Fun Fact: CyberArk is the global leader in Identity Security. While there are other PAM tools in the market, CyberArk unquestionably leads the way. The demand for skilled engineers in this ecosystem far exceeds the available talent pool.

Course Schedule: 8 Weeks + 2 Weeks Interview Preparation
Adoption Timeline: 14 Weeks
Interview Readiness: 16 – 20 Weeks
“Adoption” refers to the duration it takes for the average learner to fully comprehend the entire training. This time includes personal learning time.

Endpoint Privilege Management (EPM)

CyberArk’s Endpoint Privilege Management (EPM) is the platform’s solution for strengthening and hardening all desktops, laptops, and servers that run on various operating systems such as Windows, macOS, or Linux. Learning Cyber PAM and adding EPM gives you the advantage that you need to command a top-level job.

EPM deployment allows businesses to block and contain attacks at the endpoint, reducing the risk of company’s data being stolen or encrypted and held for ransom. During this course, we impact the needed knowledge so that candidates like you can interview confidently and support clients successfully.

Yes, CyberArk’s EPM and the other solutions fall within the Identity Management domain of Cybersecurity.

Course Schedule: 4 Weeks + 2 Weeks Interview
Adoption Timeline: Incl. PAM = 16 Weeks
Interview Readiness: 18 – 22 Weeks

CyberArk Privilege Cloud (CPC) and Workforce Password Management (WPM)

We will walk you through the processes to stand up and configure the CyberArk Privilege Cloud environment, setup the Master Policy and exceptions for specific use cases, integrate it with Single Sign On (SSO)/Multi-factor Authentication (MFA), export logs to a SIEM solution, perform account discovery and onboarding for Active Directory privileged accounts, and enable privileged user session management for RDP/SSH connections.

Sounds like a lot of grammar!? Don’t sweat it! We wouldn’t have added this course if we didn’t believe it was essential. The majority or ALL of the clients you’ll work for will seek CyberArk Engineers who can proficiently support a Privilege Cloud environment. Consider this course a valuable gift to yourself, as you’ll undoubtedly require it to thrive in the industry.

Course Schedule: 4 Weeks + 2 Weeks Interview Preparation
Adoption Timeline: Incl. PAM + EPM = 18 Weeks
Interview Readiness: 20 – 24 Weeks

SCHEDULE

Classes start October 7, 2023. Full schedule will be communicated at enrollment. All training sessions will be recorded and available for replay within 24 hours.

0 +

Active Modules

Get in Touch

Reach out to the QineticEDGE team

WhatsApp: +1 7738277231
Email: qineticedge@gmail.com
Address: 15 S Howard Ave Roselle IL 60172

Testimonials

I've had an incredibly rewarding experience working with Bella. She provided invaluable support during my job search and coached me on interview techniques, which ultimately led to me receiving two job offers. It's worth noting that I had previously received training elsewhere, but my previous trainer's support ended as soon as the classes concluded. In contrast, Bella's commitment to her students goes beyond the classroom. I'm excited to be joining Bella's CyberArk classes to gain a deeper understanding of the subject.

Folakemi M.

Bella makes any complex topics easy to understand. I reached out to her as a Mentee, she supported me with hands-on labs which were particularly beneficial, allowing me to apply what I learned in real-world scenarios. I received my offer with a Big 4 Consulting company in July. I feel very accomplished, and would recommend Bella to everyone looking to get into IT.

Henry A.

It was almost one year since I had taken my CyberArk training and I still couldn't find a job. A friend had told me about Bella. I reached out to her promptly on WhatsApp, and Bella was incredibly helpful right from the start. She patiently answered all my technical questions and went the extra mile by connecting me with others on Zoom calls for interview preparation. Her interview template turned out to be a lifesaver. On August l2, I called Bella to give her the good news that I may be receiving an offer. Fast forward to September, the offer finally came for a Consultant role, with the exciting prospect of a potential promotion to Senior Consultant after 6 months. Thank you, Bella! You deserve all the 5 stars

Kehinde O.

DISCLOSURE

You took training somewhere else?

We don’t provide interview support as a standalone service; instead, we believe in a more integrated method. This means if you choose to work with us, you will engage in a complete re-training process. Our focus is on refining and enhancing your skills across the board, ensuring a well-rounded and effective approach to achieving your goals.

We are dedicated to providing meticulous support through tailored interview preparation. Drawing from extensive experience in past and current interviews, We offer up to 6 weeks of immersive interview readiness. This involves a strategic blend of interview techniques, certification(s) preparedness, and professional resume coaching.

Completion Certification

You will be issued a course completion certificate for each package you complete.

Thanks for checking us out!

F.A.Q.

Frequently Asked

We’ve addressed some of the questions you may have. If you have any additional questions, please don’t hesitate to reach out to us. We’re here to provide answers to all your inquiries.

Yes. reach out to us to set this up for you before processing any payment. Please note that a small processing fee is included in the payment plan prices.

As dedicated security professionals, safeguarding credit card information is extremely important to us. To ensure the utmost security for your transactions, We have established partnerships with PayPal. This trusted payment platform employ a secure socket layer with 128-bit encryption, guaranteeing that your transactions are fully protected from any fraudulent activities.

It’s essential to note that WE WILL NEVER HAVE ACCESS TO ANY OF YOUR CREDIT CARD INFORMATION. As long as you refrain from sharing your account details (which is strictly prohibited), you should be the sole individual with access to your account information, reinforcing the security of your financial data. Your peace of mind regarding the safety of your transactions is our top priority.

This program is a practical course that teaches how to perform CyberArk PAM, EPM, and Privilege Cloud like an experienced professional. While some of this information may be on the exams, the program is not designed for the certification exam preparation. A section in the program discusses certifications and provides suggestions on how to study for exams.

This program is tailored to provide you with comprehensive knowledge and skills to become a CyberArk PAM, EPM, and Privilege Cloud professional. To aid you in your job search, you’ll have access to resume development and interview preparation skills through the program’s bonuses. Additionally, we offer reasonable interview preparation support to assist you in your career journey.

Students are provided with support throughout their access period in the private course community group. Support includes answering questions related to the program and reasonable interview preparation beyond the bonus.

There is NO REFUND. Please make sure you are committed to the program before you make the purchase. Once the purchase has been made, you will not be able to request a refund.

Once you’ve enrolled in the program, you will receive an email containing login credentials for the course website. Session recordings will be accessible to students after the completion of each class.

Yes, students have the option to extend their course access beyond the initial access period. This extended access is available for a small monthly fee.

The course is MARKED AS COMPLETED at the end of your enrollment cycle. You will retain access to the course materials and any updates for a duration of one year from your enrollment date.

Class RETAKES ARE NOT ACCOMMODATED; you will have the opportunity to utilize session recordings for review and reference.

This course is designed to be beginner-friendly, ensuring you acquire the necessary knowledge to kickstart your journey as a CyberArk Administrator. We begin by covering foundational principles and progressively build upon them. It’s worth noting that we will introduce you to basic Linux administration, PowerShell scripting, as well as networking and firewall essentials. These fundamentals will equip you with the skills you need to get up to speed in the field.

This course consists of live training sessions, covering CyberArk Privilege Access Management, Endpoint Privilege Management, Privilege Cloud, and Workforce Password Management. It’s important to note that all classes are recorded, and the recordings will be made available within 24 hours after each session. This allows you to review the material at your convenience.