Overview
This course brings together two challenging areas facing IT security professionals today: incident response and virtualization. Forensics is at the heart of incident response, and therefore this training will focus on how to gather evidence relating to an incident – the what, when, where, who and why of an incident – within today’s common virtual environments.
Upon Completion
Students will:
Course Length
5 Days
Delivery Mode:
| 06-Apr-2026
Cyberark - Privileged Access Management (PAM) Administrator Privileged Access Management (PAM) Administrator |
| 13-Apr-2026
Cyberark - Privileged Access Management (PAM) Install and Configuration Privileged Access Management (PAM) Install and Configuration |
| 20-Apr-2026
Cyberark - Privileged Cloud Deployment and Administration Privileged Cloud Deployment and Administration |
| 04-May-2026
Cyberark - Endpoint Privilege Manager (EPM) Administration Endpoint Privilege Manager (EPM) Administration |
| 01-Jun-2026
Cyberark - Privileged Access Management (PAM) Administrator Privileged Access Management (PAM) Administrator |
| 08-Jun-2026
Cyberark - Privileged Access Management (PAM) Install and Configuration Privileged Access Management (PAM) Install and Configuration |
| 15-Jun-2026
Cyberark - Privileged Cloud Deployment and Administration Privileged Cloud Deployment and Administration |