Gain the foundational knowledge needed to administer, configure, and utilize your BeyondTrust solution for optimum performance. BeyondTrust University training is designed to maximize the value of your BeyondTrust solutions by educating your users on best practices for configuring and using our products.
The Privileged Remote Access Administration course is ideal for system and network administrators who want to learn how to configure BeyondTrust in the network and manage secure access to critical systems utilizing BeyondTrust’s patented Jump Technology and other access features. During this course your administrators will learn how to efficiently administer and configure BeyondTrust on an ongoing basis for optimized security.
This course is available in these formats:
All courses come with manuals, virtual lab environments, and access to BeyondTrust University’s education portal.
Participants who successfully complete the Privileged Remote Access Administration training are eligible to take the associated BeyondTrust Certification exam. Earn up to 12 hours of Continuing Professional Education (CPE) credits.
11:00am - 3:00pm (ET) each day
5:00am - 9:00am (ET) each day
11:00am - 3:00pm (ET) each day
5:00am - 9:00am (ET) each day
11:00am - 3:00pm (ET) each day
Unit 1: Laying the Foundation |
---|
Course Overview & Objectives |
Lesson 1: How Privileged Remote Access Works |
Lesson 2: What Privileged Remote Access Supports |
Lesson 3: Administrative Interfaces |
Lesson 4: Access Console |
Unit 2: Provisioning Endpoints |
Lesson 1: Adding Jump Item Roles |
Lesson 2: Enabling Jump Policies |
Lesson 3: Creating Jump Groups |
Lesson 4: Understanding Jump Methods |
Lesson 5: Using & Configuring the Jump Item Interface |
Lesson 6: Deploying Jump Clients |
Lesson 7: Deploying Jumpoints |
Lesson 8: Configuring SecureApp |
Lesson 9: Injecting Credentials |
Unit 3: Enforcing Security |
Lesson 1: Site-wide Configuration Options |
Lesson 2: Site-wide Security Options |
Lesson 3: Session Policies |
Lesson 4: Defining Local Users |
Lesson 5: Configuration LDAP Security Providers |
Lesson 6: Defining Teams |
Lesson 7: Monitoring Using the Dashboard |
Lesson 8: Defining Group Policies |
Lesson 9: Defining Vendor Groups |
Supplemental Material |
Appendix A: References |
Appendix B: Using Certificate Management |
Appendix C: Permissions |
Appendix D: Firewall Rules |
Appendix E: Integration Client |
Appendix F: Configuring the Appliance |
Appendix G: BeyondTrust Glossary |