Gain the foundational knowledge needed to administer, configure, and utilize your BeyondTrust solution for optimum performance. BeyondTrust University training is designed to maximize the value of your BeyondTrust solutions by educating your users on best practices for configuring and using our products.
This course is designed for security professionals who need to learn how to deploy, configure, and utilize Privilege Management for Windows in their unique environment. During the course, administrators will learn best practices for installing and administering Privilege Management for Windows. This course includes a hands-on lab with exercises for students to practice what they learn.
This course is available in the following formats:
All courses come with manuals, virtual lab environments, and access to BeyondTrust University’s education portal.
Participants who successfully complete the Privilege Management for Windows training are eligible to take the associated BeyondTrust Certification exam. Earn up to 16 hours of Continuing Professional Education (CPE) credits.
11:00am - 3:00pm (ET) each day
4:00am - 8:00am (ET) each day
12:00pm - 4:00pm (ET) each day
4:00am - 8:00am (ET) each day
12:00pm - 4:00pm (ET) each day
12:00pm - 4:00pm (ET) each day
Unit 1: Welcome & Course Overview |
---|
Lesson 1: What is Privilege Management? |
Lesson 2: Server Overview |
Lesson 3: Client Overview |
Lesson 4: Policy Overview |
Unit 2: Configuring Core Policies |
Lesson 1: Creating Workstyles |
Lesson 2: Defining Applications |
Lesson 3: Configuring End-User Messages |
Lesson 4: Applying Application Rules |
Lesson 5: Reviewing Access Tokens |
Unit 3: Exploring Use Cases |
Lesson 1: Exploring Specific and Automatic Elevations |
Lesson 2: Replacing UAC Messaging |
Lesson 3: Enabling On-Demand Elevation |
Lesson 4: Applying the Whitelist |
Lesson 5: Blocking Specific Applications |
Lesson 6: Discovering Unknown Applications |
Unit 4: Enabling Advanced Features |
Lesson 1: Using Workstyle Filters |
Lesson 2: Collecting User and Host Data |
Lesson 3: Using Remote Powershell |
Lesson 4: Utilizing Advanced Application Definitions |
Lesson 5: Enabling Content Control |
Lesson 6: Using Audit Scripts |
Lesson 7: Enabling Rule Scripts |
Lesson 8: Trusted Application Protection (TAP) |
Lesson 9: Configuring Trusted Application Protection |
Lesson 10: Creating Custom Tokens |
Unit 5: Understanding the Protected Environment |
Lesson 1: Examining the Client Architecture |
Lesson 2: Exploring the Client Footprint |
Lesson 3: Applying Anti-Tamper Protection |
Unit 6: Solving Configuration Issues |
Lesson 1: Examining the Troubleshooting Workflow |
Lesson 2: Using Basic Troubleshooting Steps |
Lesson 3: Examining Policy Conflicts |
Lesson 4: Resolving Compatibility Issues |
Lesson 5: Utilizing Troubleshooting Tools |
Appendices |
Common Event IDs |
Common Event Variables |