Knowledge Enables Success

Gain the foundational knowledge needed to administer, configure, and utilize your BeyondTrust solution for optimum performance. BeyondTrust University training is designed to maximize the value of your BeyondTrust solutions by educating your users on best practices for configuring and using our products.

This course is designed for security professionals who need to learn how to deploy, configure, and utilize Privilege Management for Mac in their unique environment. During the course, administrators will learn best practices for installing and administering Privileged Management for Mac.

This course is available in the following formats:

  • Shared or Private Virtual - 8 hours over 2 days
  • Private On-site - 1 day

All courses come with manuals and access to BeyondTrust University’s education portal. Private sessions have up to 10 seats available.

  • Deploying the Software – Walk through the different ways of installing and deploying the software including deployment to endpoints.
  • Configuration and Control – Learn how to configure policies and how to create application control through workstyles and application groups.
  • Achieve Least Privilege – Remove excessive end-user privileges without hindering productivity.
  • Control Authorization Requests – Maintain security, user productivity, and IT operational efficiency by enforcing least privilege across the Mac environment.

Participants who successfully complete the Privilege Management for Mac training are eligible to take the associated BeyondTrust Certification exam. Earn up to 8 hours of Continuing Professional Education (CPE) credits.

Upcoming Courses

May 28 - 29, 2024

11:00am - 3:00pm (ET) each day

7 seats available
July 1 - 2, 2024

12:00pm - 4:00pm (ET) each day

9 seats available
Unit 1: Laying the Foundation
Lesson 1: What is Privilege Management?
Lesson 2: Policy Deployment Options
Lesson 3: Client Overview
Lesson 4: Rapid Deployment Tool
Lesson 5: Editing Policy
Lesson 6: Policy Overview
Unit 2: Configuring Core Policy Components
Lesson 1: Workstyles
Lesson 2: Defining Applications
Lesson 3: End-User Messages
Lesson 4: Application Rules
Unit 3: Applying Use Cases
Lesson 1: Specific Authorizations
Lesson 2: Authorization Replacement
Lesson 3: System Trusted Applications
Lesson 4: Blocking Applications
Lesson 5: Handling Unknown Applications
Lesson 6: Controlling Sudo
Lesson 7: Mount Assist and /Applications/
Prefers reduced motion setting detected. Animations will now be reduced as a result.