Defender PAM - Study Guide
Defender PAM - Study Guide
Study Guide
Exam Objectives
The CyberArk Defender Certification tests for the practical knowledge and technical skills to
maintain day-to-day operations and to support the on-going maintenance of the CyberArk
Privileged Access Managment solution. It is intended to certify an examinee’s competence to
fill one of the following roles within a Privileged Account Managment Program.
Application Support
The Application Support Engineer provides first level support of the CyberArk applications
within the customer organization.
Vault Administrator
The Vault Administrator is responsible for application administration and maintaining an
operable PAM environment.
Data Administrator
The Data Administrator is responsible for provisioning safes and platforms, and for
onboarding accounts
Exam Content
The CyberArk Defender Certification tests examanees ability to perform the following tasks
in seven knowledge domains. Only functions of the Core PAM solution are included.
Application Managment
Identify and describe tools used to monitor CyberArk application health
Describe the use of PrivateArk
Describe how each component communicates with others or devices at a high-level
Describe the process to maintain an appropriate chain of custody for encryption
keys
User Management
Configure additional LDAP hosts
Validate that pre-configured directory mappings are functioning correctly
Verify an LDAP configuration is using SSL
Add a user to a Vault group
Add an LDAP User/Group to a Local Group
Compare and contrast save and vault level permissions
Configure Safe level permissions on a User group
Configure Vault level permissions on a User
Identify each Built-In Vault User or Group and their function
Describe how to log in as the Master user
Password Managment
Configure a request/approval process
Configure workflow processes to ensure non-repudiation
Configure logon and reconcile accounts
Compare and contrast reconcile and logon accounts
Configure and link a service account platform to a target account platform
Configure workflow processes to reduce the risk of credential theft
Configure workflow processes to comply with audit/regulatory policies
Configure Safe Data Retention, Time of Use Restrictions, and CPM assignment
Configure management of workstation passwords using Loosely Connected Devices
Manage the password of a supported usage
Describe the process to provision a safe
Identify and describe safe naming conventions
Duplicate a platform
Add a User/Group to a safe in accordance with access control policies
Use an OOB (out-of-box) platform to manage a device
Import a custom platform from the Marketplace
Setup automatic verification, management, and reconciliation of passwords or SSH
keys
Session Management
Configure a split workflow
Configure the master policy to create PSM recordings
Configure the master policy to enable the connect button
Configure the master policy to enable the PSM
Configure the PSM to use the HTML5 Gateway
Identify and describe connection components and their functions
Configure various PSM recording capabilities
Study Resources
CyberArk provides a number of resources to prepare for the Defender Exam
Free eLearning
Core PAS Troubleshooting
Documentation
CyberArk Privileged Access Security Administration Guide