Most Popular Courses

Remote Support for Administrators

Available Training Types:

  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for system/network administrators who want to learn how to configure and extend Remote Support for their unique environment. During the course administrators will learn how to efficiently administer and configure Remote Support on an ongoing basis focusing on these learning objectives: Setting Remote Support up for Success, Establishing Security Policies, Mastering Support Options, Customizing the Customer Experience, and Optimizing Session Data Reporting and Archival. This course includes a hands-on lab with exercises for students to practice what they learn. This course is offered as a two-day on-site course, or as a virtual course delivered over 4 half days.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day

Remote Support Console for Users

Available Training Types:

  • eLearning
  • Private Dedicated Training
  • Onsite Training

Ideal for help desk analysts, support professionals and managers, this course provides a solid understanding of the Representative Console, and what your customer sees during a support session. During the half-day course, your support representatives will become knowledgeable in session initiation, troubleshooting tools, session management and other support features. As a result, reps gain confidence and greater efficiency when initiating sessions and resolving customer issues. (Offered on-site, virtual or on-demand)

Download the Data Sheet Request Information

Remote Support Chat Implementation

Available Training Types:

  • Private Dedicated Training
  • Onsite Training

The Remote Support Chat Implementation Service is designed to enhance the efficiency of your organization and maximize your return on your investment. Chat enables support organizations to deliver a better customer service experience at a lower cost. With Chat deployments, your representatives can connect to a chat session with your customer, and quickly elevate to a full remote control session.

Download the Data Sheet Request Information

Privileged Remote Access for Administrators

Available Training Types:

  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the security professional tasked with administering, monitoring and reporting using Privileged Remote Access. During the course administrators learn how to efficiently configure Privileged Remote Access in the network and manage secure access to critical systems utilizing our patented Jump Technology and other access features. This course includes a hands-on lab with exercises for students to practice what they learn. This course is offered as a two-day on-site course or as a virtual course delivered over three days via five hour increments.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day

Privileged Remote Access Console

Available Training Types:

  • eLearning
  • Private Dedicated Training
  • Onsite Training

The Privileged Remote Access Console course is ideal for any resource who plans to connect to endpoints using the Access Console. During this course your Access Console users will learn how to install the console and access remote endpoints using the consoles. This course is available virtual or onsite, so your team can engage in learning from any location. The course length is three hours on-site or virtually. This course is led by a certified instructor.

Download the Data Sheet Request Information

Privileged Remote Access Vendor Onboarding

Available Training Types:

  • eLearning

The Privileged Remote Access Vendor Onboarding service describes how to securely deploy, monitor, and control endpoints, and guides vendors who will be using the Access Console to access critical systems within your infrastructure.

Download the Data Sheet Request Information

Password Safe Foundations

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the security professional tasked with administering, monitoring and reporting using Password Safe. During the course administrators learn how to install and configure Network Security Scanner and BeyondInsight Console, configure analytics & reporting, set up functional accounts and password rules, add managed systems, set up accounts and roles, and work with Smart Rules & Smart Groups. This course includes hands-on lab with exercises for students to practice what they learn. This course is offered as a two-day on-site course, as a virtual course delivered over three days via five hour increments, or via eLearning.

Download the Data Sheet Request Information

Upcoming Classes

  • ; (Eastern) each day
  • ; (Eastern) each day
  • ; (Eastern) each day

Privilege Management for Unix/Linux (PowerBroker for Unix & Linux Foundations)

Available Training Types:

  • eLearning
  • Public Shared Training
  • Private Dedicated Training
  • Onsite Training

This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting on PowerBroker for Unix & Linux. Students learn how to install the products components, identify and edit configuration files, create policy for privilege delegation, install the components needed for I/O log review, and use the Analytics and Reporting from within BeyondInsight.

Download the Data Sheet Request Information

Upcoming Classes

    Privilege Management for Windows (PowerBroker for Windows Foundations)

    Available Training Types:

    • eLearning
    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    This course is designed for the IT security professional tasked with administering, monitoring and reporting on PowerBroker for Windows. Students learn how to install the products components, create path, publisher & shell rules for privilege delegation, customize user messages, setup secondary authorization and challenge/response mechanisms. They will create risk & compliance rules, and file integrity rules. They will learn how to use BeyondInsight to review event data, create new rules from captured events, and setup and view captured sessions.

    Download the Data Sheet Request Information

    Upcoming Classes

    • ; (Eastern) each day
    • ; (Eastern) each day

    Enterprise Vulnerability Management Foundations (Retina CS)

    Available Training Types:

    • eLearning
    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    This course is designed for the IT security professional tasked with installation, administering, monitoring and reporting on Enterprise Vulnerability Management. Students learn how to install the products components, run network-based vulnerability scans, create Smart Rules, navigate the BeyondInsight interface and examine vulnerability findings, create pivot grids and use BeyondInsight’s Analytics and Reporting.

    Download the Data Sheet Request Information

    Upcoming Classes

    • ; (Eastern) each day

    AD Bridge Foundations (Powered by Powerbroker Identity Services)

    Available Training Types:

    • eLearning
    • Private Dedicated Training
    • Onsite Training

    The AD Bridge Foundations Training is designed for the IT security management professional tasked with administering, monitoring and reporting on AD Bridge. Students learn how to install and configure all product components, including the Management Console, Reporting Database and operating system Agents. They will connect a Unix host to Active Directory, create and configure Group Policy Objects, configure Active Directory users for Unix/Linux logon via console, SSH & PuTTY.

    Download the Data Sheet Request Information

    Privilege Management for Desktops Foundations (Defendpoint Foundations)

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    This course is ideal for security professionals who need to learn how to deploy, configure,and utilize Privilege Management for Desktops in their unique environment. During the course, you will learn best practices for installing and administering Privilege Management for Desktops (Defendpoint). For Public Shared course dates after July 1st, 2019, please see the Privileged Management for Desktops Complete schedule below.

    Download the Data Sheet Request Information

    Privilege Management for Desktops Advanced (Defendpoint Advanced)

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    The Privilege Management for Desktops Advanced course builds on the Foundations course with advanced topics. The core training will improve your understanding of the architecture and operation of the software in your environment, as well as providing troubleshooting processes. Additional eLearning options focus on enterprise reporting options, using Privilege Management for Desktops with macOS, and managing your system using iC3. Security professionals who complete this course can receive a certification. The Privilege Management for Desktops Foundations course is a prerequisite for taking this course. For Public Shared course dates after July 1st, 2019, please see the Privileged Management for Desktops Complete schedule below.

    Download the Data Sheet Request Information

    Privileged Management for Desktops Complete (Defendpoint Foundations + Advanced)

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    This course combines the Privilege Management for Desktops Foundations course and Privilege Management for Desktops Advanced course into a bundle for those who wish to take both together. The Foundations course is designed to help you get Privilege Management for Desktops up and running in your environment, while the Advanced course will give you an enhanced understanding of the product and a path to certification.

    Upcoming Classes

    • GPO/PMC/BI: ; (Eastern) each day
    • GPO/PMC/BI: ; (Eastern) each day
    • ePO: ; (Eastern) each day
    • GPO/PMC/BI: ; (Eastern) each day
    • GPO/PMC/BI: ; (Eastern) each day

    Privileged Identity for Administrators

    Available Training Types:

    • Public Shared Training
    • Private Dedicated Training
    • Onsite Training

    Privileged Identity for Administrators is a 15-hour course, delivered in five-hour increments over three days. Once enrolled in a course the system will generate three calendar invites, one for each day of the course. Each invite contains the link for a web-based presentation with two-way VoIP (computer) or phone audio. This course is designed for IT professionals who want to learn how to deploy, configure, and extend Privileged Identity for their unique environment. During the course, you will learn how to install and administer the software. This course is focused on these learning objectives: how to install and upgrade, understand the Privileged Identity architecture and key components, define and configure the privileged identity management strategy. This course includes a hands-on lab with exercises for students to practice what they learned.

    Download the Data Sheet Request Information

    Upcoming Classes

    • ; (Eastern) each day

    Contact Us