Beyondtrust PAM Unix:Linux
Beyondtrust PAM Unix:Linux
All courses come with manuals, virtual lab environments, and access to BeyondTrust University’s education portal.
Course Syllabus
Unit 1: Introduction
Introduction
Unit 2: Architecture & Installation
Lesson 1: Understand the Key Components of the Solution
Lesson 2: Install all Components on a Linux Host
Unit 3 – Configure Basic Policy
Lesson 1: Identifying the Key Configuration Files
Lesson 2: Create and Verify a New Policy
Unit 4 – Privilege Delegation
Lesson 1: Policy Precedence and Order of Processing
Lesson 2: Privilege Delegation Use Cases
Unit 5 – Auditing & Logging
Lesson 1: Understanding the Auditing and Logging Capabilities
Lesson 2: Review Event Logs
Lesson 3: Use the Replay Utility to Investigate I/O Log Activity
Unit 6 – Integration
Lesson 1: Configure Solr for I/O Log Indexing and Search
Lesson 2: Review Audit Data from BeyondInsight
Lesson 3: Configure with Sudo
Unit 7 – Final Configuration
Lesson 1: Policy Structure
Lesson 2: Policy Use Cases
Lesson 3: Advanced Control and Audit
Lesson 4: Authentication
Lesson 5: Failover
Lesson 6: Additional Product Integrations
2
BeyondTrust is the worldwide leader in intelligent identity and access security, enabling organizations to protect
identities, stop threats, and deliver dynamic access. We are leading the charge in innovating identity-first security and
are trusted by 20,000 customers, including 75 of the Fortune 100, plus a global ecosystem of partners.
beyondtrust.com