0% found this document useful (0 votes)
10 views3 pages

Beyondtrust PAM Unix:Linux

The document outlines a training course for IT security professionals on Privilege Management for Unix & Linux, focusing on installation, configuration, policy deployment, and auditing. It offers flexible training options, including private virtual and on-site formats, and participants can earn up to 15 hours of Continuing Professional Education (CPE) credits. The course covers key learning objectives and a detailed syllabus, ensuring users maximize the value of their BeyondTrust solutions.

Uploaded by

neoalt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

Beyondtrust PAM Unix:Linux

The document outlines a training course for IT security professionals on Privilege Management for Unix & Linux, focusing on installation, configuration, policy deployment, and auditing. It offers flexible training options, including private virtual and on-site formats, and participants can earn up to 15 hours of Continuing Professional Education (CPE) credits. The course covers key learning objectives and a detailed syllabus, ensuring users maximize the value of their BeyondTrust solutions.

Uploaded by

neoalt
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Privilege Management for

Unix & Linux

Knowledge Enables Success


Gain the foundational knowledge needed to administer, configure, and utilize your BeyondTrust solution for optimum
performance. BeyondTrust University training is designed to maximize the value of your BeyondTrust solutions by
educating your users on best practices for configuring and using our products.
This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting
on Privilege Management for Unix & Linux. Students learn how to install the products components, identify and edit
configuration files, create policy for privilege delegation, install the components needed for I/O log review, and use the
Analytics and Reporting from within BeyondInsight.

Key Learning Objectives


Initial Configuration – Learn how to install and configure BeyondInsight for Unix & Linux and the Privilege
Management for Unix & Linux software suite for your environment.
Deploy Policies – See how to configure script-based or role-based policies and deploy them using the policy editor.
Reports and Auditing – Review your event logs and investigate activity, including the Advanced Control and Audit
(ACA) feature.

Flexible Training Options


This course is available in these formats:

Private Virtual - 15 hours over 3 days


Private On-site - 2 days

All courses come with manuals, virtual lab environments, and access to BeyondTrust University’s education portal.

CPE Certification Credit


1
Participants who successfully complete the Privilege Management for Unix & Linux training are eligible to take the
associated BeyondTrust Certification exam. Earn up to 15 hours of Continuing Professional Education (CPE) credits.

Course Syllabus

Unit 1: Introduction
Introduction
Unit 2: Architecture & Installation
Lesson 1: Understand the Key Components of the Solution
Lesson 2: Install all Components on a Linux Host
Unit 3 – Configure Basic Policy
Lesson 1: Identifying the Key Configuration Files
Lesson 2: Create and Verify a New Policy
Unit 4 – Privilege Delegation
Lesson 1: Policy Precedence and Order of Processing
Lesson 2: Privilege Delegation Use Cases
Unit 5 – Auditing & Logging
Lesson 1: Understanding the Auditing and Logging Capabilities
Lesson 2: Review Event Logs
Lesson 3: Use the Replay Utility to Investigate I/O Log Activity
Unit 6 – Integration
Lesson 1: Configure Solr for I/O Log Indexing and Search
Lesson 2: Review Audit Data from BeyondInsight
Lesson 3: Configure with Sudo
Unit 7 – Final Configuration
Lesson 1: Policy Structure
Lesson 2: Policy Use Cases
Lesson 3: Advanced Control and Audit
Lesson 4: Authentication
Lesson 5: Failover
Lesson 6: Additional Product Integrations

2
BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect
identities, stop threats, and deliver dynamic access. We are leading the charge in innovating identity-first security and
are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners.
beyondtrust.com

September 25, 2023, 05:39:40 PM GMT

You might also like